Attention-Enhanced Defensive Distillation Network for Channel Estimation in V2X mm-Wave Secure Communication
Abstract
:1. Introduction
- This research integrates the attention mechanism into mm-wave channel estimation for V2X, enhancing the model’s capacity to concentrate on essential channel characteristics. The attention mechanism reduces noise and irrelevant data by allowing the model to prioritize and assign weights to the most relevant input features. This leads to more accurate channel estimation and better resilience to environmental variations;
- The attention mechanism is integrated with the defensive distillation method to form a new approach named AEDDN. This method is applied to V2X channel estimation and adversarial attack mitigation, demonstrating superior performance compared to traditional CNN-based methods;
- The AEDDN method is applied in a complex V2X mm-wave simulation environment to evaluate its performance under realistic conditions. Testing the AEDDN model in this environment demonstrates its robustness, accuracy in channel estimation, and effectiveness in mitigating adversarial attacks.
2. Related Work
3. System Model
3.1. The Framework of AEDDN Method
3.2. Adversarial Attacks
- (1)
- The Fast Gradient Sign Method (FGSM) is a popular and simple attack that modifies the input by utilizing the gradient of the loss function to increase the prediction error of the model. The FGSM formula is as follows:In expression (1), is the adversarial example, x is the original input, controls the perturbation size, is the gradient of the loss for x, and gives the gradient direction.
- (2)
- The Projected Gradient Descent (PGD) is stronger than the FGSM, applying several minor perturbations to generate adversarial examples. After each step, the perturbations are projected onto a predefined -ball to keep the adversarial example within a set distance from the original input.The attack performs gradient ascent iteratively to maximize the model’s loss while keeping the perturbation constrained within an -ball around the original input. The PGD update rule at step t is given by the following:
- (3)
- The Carlini and Wagner (C&W) attack is a highly effective adversarial method that minimizes perturbation while misleading the model. Unlike the FGSM or PGD, it formulates adversarial example generation as an optimization problem aimed at minimizing a particular loss function. The C&W attack minimizes a custom loss function that balances the size of the perturbation and the likelihood of misclassification:
3.3. Defense Distillation
3.4. Transformer Attention Mechanisms
4. Experiments
4.1. Dataset Description
4.2. Experimental Setting
4.3. Experimental Results for 6g-Channel-Estimation Dataset
4.4. Experimental Results for MMMC Dataset
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Chataut, R.; Akl, R. Massive MIMO Systems for 5G and Beyond Networks—Overview, Recent Trends, Challenges, and Future Research Direction. Sensors 2020, 20, 2753. [Google Scholar] [CrossRef]
- Rappaport, T.S.; Xing, Y.; MacCartney, G.R. Overview of Millimeter Wave Communications for Fifth-Generation (5G) Wireless Networks—With a Focus on Propagation Models. IEEE Trans. Antennas Propag. 2017, 65, 6213–6230. [Google Scholar] [CrossRef]
- Elijah, O.; Abdul Rahim, S.K.; New, W.K.; Leow, C.Y.; Cumanan, K.; Geok, T.K. Intelligent Massive MIMO Systems for Beyond 5G Networks: An Overview and Future Trends. IEEE Access 2022, 10, 102532–102563. [Google Scholar] [CrossRef]
- Sun, Y.; Peng, M.; Mao, S.; Wang, Y.; Huang, S. Application of Machine Learning in Wireless Networks: Key Techniques and Open Issues. IEEE Commun. Surv. Tutor. 2019, 21, 3072–3108. [Google Scholar] [CrossRef]
- Goodfellow, I.; Shlens, J.; Szegedy, C. Explaining and Harnessing Adversarial Examples. arXiv 2014, arXiv:1412.6572. [Google Scholar]
- Creswell, A.; White, T.; Dumoulin, V.; Arulkumaran, K.; Sengupta, B.; Bharath, A.A. Generative Adversarial Networks: An Overview. IEEE Signal Process. Mag. 2018, 35, 53–65. [Google Scholar] [CrossRef]
- Harvanek, M.; Bolcek, J.; Kufa, J.; Polak, L.; Simka, M.; Marsalek, R. Survey on 5G Physical Layer Security Threats and Countermeasures. Sensors 2024, 24, 5523. [Google Scholar] [CrossRef]
- Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef]
- Rangan, S.; Rappaport, T.S.; Erkip, E. Millimeter-Wave Cellular Wireless Networks: Potentials and Challenges. Proc. IEEE 2014, 102, 366–385. [Google Scholar] [CrossRef]
- Vaigandla, K.K.; Rao, K.V.R.; Shruthi, D.; Kumar, P. Millimeter Wave Communications: Propagation Characteristics, Beamforming, Architecture, Standardization, Challenges, and Applications. Des. Eng. 2021, 9, 10144–10169. [Google Scholar]
- Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [Google Scholar] [CrossRef]
- Uwaechia, A.N.; Mahyuddin, N.M. A Comprehensive Survey on Millimeter Wave Communications for Fifth-Generation Wireless Networks: Feasibility and Challenges. IEEE Access 2020, 8, 62367–62414. [Google Scholar] [CrossRef]
- O’Shea, T.J.; Hoydis, J. An Introduction to Deep Learning for the Physical Layer. IEEE Trans. Cogn. Commun. Netw. 2017, 3, 563–575. [Google Scholar] [CrossRef]
- Chatzoglou, E.; Goudos, S.K. Beam-Selection for 5G/B5G Networks Using Machine Learning: A Comparative Study. Sensors 2023, 23, 2967. [Google Scholar] [CrossRef]
- Lansky, J.; Pospisil, T.; Valis, M.; Kucera, T. Deep Learning-Based Intrusion Detection Systems: A Systematic Review. IEEE Access 2021, 9, 101574–101599. [Google Scholar] [CrossRef]
- Alrabeiah, M.; Alkhateeb, A. Deep Learning for mmWave Beam and Blockage Prediction Using Sub-6 GHz Channels. IEEE Trans. Commun. 2020, 68, 5504–5518. [Google Scholar] [CrossRef]
- Sim, M.S.; Lim, Y.-G.; Park, S.H.; Dai, L.; Chae, C.-B. Deep Learning-Based mmWave Beam Selection for 5G NR/6G with Sub-6 GHz Channel Information: Algorithms and Prototype Validation. IEEE Access 2020, 8, 51634–51646. [Google Scholar] [CrossRef]
- Yuan, Y.; Zheng, G.; Wong, K.K.; Letaief, K.B. Meta-Reinforcement Learning Based Resource Allocation for Dynamic V2X Communications. IEEE Trans. Veh. Technol. 2021, 70, 8964–8977. [Google Scholar] [CrossRef]
- Papernot, N.; McDaniel, P.; Goodfellow, I. Transferability in Machine Learning: From Phenomena to Black-Box Attacks Using Adversarial Samples. arXiv 2016, arXiv:1605.07277. [Google Scholar] [CrossRef]
- Vaswani, A.; Shazeer, N.; Parmar, N.; Uszkoreit, J.; Jones, L.; Gomez, A.N.; Kaiser, L.; Polosukhin, I. Attention Is All You Need. Adv. Neural Inf. Process. Syst. 2017, 30, 5998–6008. [Google Scholar]
- Xu, K.; Ba, J.; Kiros, R.; Cho, K.; Courville, A.; Salakhutdinov, R.; Zemel, R.; Bengio, Y. Show, Attend and Tell: Neural Image Caption Generation with Visual Attention. Int. Conf. Mach. Learn. 2015, 37, 2048–2057. [Google Scholar]
- Zhou, X.; Chen, X.; Tong, L.; Wang, Y. Attention-Deep Reinforcement Learning Jointly Beamforming Based on Tensor Decomposition for RIS-Assisted V2X mmWave Massive MIMO System. Complex Intell. Syst. 2024, 10, 145–160. [Google Scholar] [CrossRef]
- Wang, X.; Girshick, R.; Gupta, A.; He, K. Non-Local Neural Networks. In Proceedings of the 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA, 18–23 June 2018; Volume 31, pp. 7794–7803. [Google Scholar] [CrossRef]
- Choromanski, K.; Likhosherstov, V.; Dohan, D.; Song, X.; Gane, A.; Sarlos, T.; Hawkins, P.; Davis, J.; Kaiser, L. Rethinking Attention with Performers. In Proceedings of the 9th International Conference on Learning Representations, Virtual Event, 3–7 May 2021; pp. 1–17. [Google Scholar]
- Lin, X.; Chao, S.; Yan, D.; Guo, L.; Liu, Y.; Li, L. Multi-Sensor Data Fusion Method Based on Self-Attention Mechanism. Appl. Sci. 2023, 13, 11992. [Google Scholar] [CrossRef]
- Xie, C.; Tan, M.; Gong, B.; Wang, J.; Yuille, A.; Le, Q.V. Adversarial Examples Improve Image Recognition. In Proceedings of the 2019 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA, 16–20 June 2019; pp. 819–828. [Google Scholar] [CrossRef]
- Tramer, F.; Kurakin, A.; Papernot, N.; Goodfellow, I.; Boneh, D.; McDaniel, P. Ensemble Adversarial Training: Attacks and Defenses. In Proceedings of the 6th International Conference on Learning Representations, Vancouver, BC, Canada, 30 April–3 May 2018; pp. 1–15. [Google Scholar]
- He, K.; Zhang, X.; Ren, S.; Sun, J. Deep Residual Learning for Image Recognition. In Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, 27–30 June 2016; pp. 770–778. [Google Scholar] [CrossRef]
- Zagoruyko, S.; Komodakis, N. Wide Residual Networks. In Proceedings of the British Machine Vision Conference (BMVC), York, UK, 19–22 September 2016. [Google Scholar]
- Faye, S.; Camelo, M.; Sottet, J.S.; Sommer, C.; Franke, M.; Baudouin, J.; Castellanos, G.; Decorme, R.; Fanti, M.P.; Fuladi, R.; et al. Integrating Network Digital Twinning into Future AI-Based 6G Systems: The 6G-TWIN Vision. In Proceedings of the 2024 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), Antwerp, Belgium, 3–6 June 2024; pp. 883–888. [Google Scholar] [CrossRef]
- Cao, H.; Garg, S.; Kaddoum, G.; Singh, S.; Hossain, M.S. Softwarized Resource Management and Allocation with Autonomous Awareness for 6G-Enabled Cooperative Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2022, 23, 24662–24671. [Google Scholar] [CrossRef]
- Xie, Y.; Guo, X.; Wang, Y.; Cheng, J.; Chen, Y. Universal Targeted Adversarial Attacks against mmWave-Based Human Activity Recognition. In Network Security Empowered by Artificial Intelligence; Springer Nature: Cham, Switzerland, 2024; pp. 177–211. [Google Scholar]
- Zhou, B.; Khosla, A.; Lapedriza, A.; Oliva, A.; Torralba, A. Learning Deep Features for Discriminative Localization. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, 27–30 June 2016. [Google Scholar] [CrossRef]
- Hinton, G.; Vinyals, O.; Dean, J. Distilling the Knowledge in a Neural Network. arXiv 2015, arXiv:1503.02531. [Google Scholar]
- Catak, F.O.; Kuzlu, M.; Catak, E.; Cali, U.; Guler, O. Defensive Distillation-Based Adversarial Attack Mitigation Method for Channel Estimation Using Deep Learning Models in Next-Generation Wireless Networks. IEEE Access 2022, 10, 98191–98203. [Google Scholar] [CrossRef]
Parameter | Value |
---|---|
Carrier frequency | 28 GHz |
Types of antennas | Half-wave dipole antenna |
Bandwidth | 2 GHZ |
Transmitting power | 10 dBm |
Noise power | −6.99 dBm |
Reflections | 4 |
Diffractions | 1 |
Transmissions | 0 |
Communication link | V2V and V2I |
Attack | MSE (CNN) | ASR (CNN) | MSE (AEDDN) | ASR (AEDDN) | |||
---|---|---|---|---|---|---|---|
Benign Input | Malicious Input | Benign Input | Malicious Input | ||||
0.1 | 0.026561 | 0.026623 | 0.002813 | 0.025066 | 0.025068 | 0.002355 | |
0.5 | 0.026561 | 0.027244 | 0.003349 | 0.025066 | 0.025835 | 0.003879 | |
FGSM | 1 | 0.026561 | 0.027863 | 0.045198 | 0.025066 | 0.027095 | 0.014980 |
2 | 0.026564 | 0.030106 | 0.047475 | 0.025066 | 0.027096 | 0.037980 | |
3 | 0.026561 | 0.031010 | 0.095989 | 0.025066 | 0.027909 | 0.076791 | |
0.1 | 0.026589 | 0.028190 | 0.018059 | 0.025073 | 0.026072 | 0.014447 | |
0.5 | 0.026588 | 0.029177 | 0.066410 | 0.025072 | 0.026795 | 0.056643 | |
PGD | 1 | 0.026588 | 0.029177 | 0.066473 | 0.025072 | 0.026898 | 0.054774 |
2 | 0.026861 | 0.029729 | 0.066182 | 0.025084 | 0.026883 | 0.060767 | |
3 | 0.026862 | 0.029185 | 0.066456 | 0.025076 | 0.026882 | 0.058987 | |
C&W | - | 0.026263 | 0.027408 | 0.027818 | 0.025084 | 0.026154 | 0.014550 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Qi, X.; Liu, Y.; Ye, Y. Attention-Enhanced Defensive Distillation Network for Channel Estimation in V2X mm-Wave Secure Communication. Sensors 2024, 24, 6464. https://doi.org/10.3390/s24196464
Qi X, Liu Y, Ye Y. Attention-Enhanced Defensive Distillation Network for Channel Estimation in V2X mm-Wave Secure Communication. Sensors. 2024; 24(19):6464. https://doi.org/10.3390/s24196464
Chicago/Turabian StyleQi, Xingyu, Yuanjian Liu, and Yingchun Ye. 2024. "Attention-Enhanced Defensive Distillation Network for Channel Estimation in V2X mm-Wave Secure Communication" Sensors 24, no. 19: 6464. https://doi.org/10.3390/s24196464
APA StyleQi, X., Liu, Y., & Ye, Y. (2024). Attention-Enhanced Defensive Distillation Network for Channel Estimation in V2X mm-Wave Secure Communication. Sensors, 24(19), 6464. https://doi.org/10.3390/s24196464