Reinforcement Learning in Edge Intelligence for Next-Generation Communications and Security

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "E1: Mathematics and Computer Science".

Deadline for manuscript submissions: 31 October 2025 | Viewed by 1832

Special Issue Editor


E-Mail Website
Guest Editor
College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
Interests: reinforcement learning; wireless security; federated learning

Special Issue Information

Dear Colleagues,

Amidst the rapid strides in information technology, next-generation communication systems are evolving towards unprecedented intelligence, security, and efficiency levels. Edge intelligence, which embeds artificial intelligence (AI) capabilities directly at the network's periphery, is a transformative technique set to revolutionize communication and security. Reinforcement learning (RL), a promising approach to decision-making and optimization, holds immense potential to bolster the capabilities of edge intelligence in intricate and ever-changing environments.

The integration of reinforcement learning into edge intelligence architectures has emerged as a cornerstone technology for the next generation of communication systems. This Special Issue will explore innovative research on reinforcement learning, edge intelligence, next-generation communications, and security and privacy intersect, with an emphasis on zero-trust architectures that ensure robust defenses, federated learning-empowered edge intelligence fostering privacy-preserving collaboration, and resource allocation and optimization strategies that maximize system performance.

The Special Issue welcomes original, high-quality research articles that address theoretical and practical aspects of reinforcement learning in edge intelligence for next-generation communications and security. Topics of interest include, but are not limited to, the following:

Edge Intelligence Architectures and Frameworks: Novel architectures and frameworks that integrate reinforcement learning at the network edge to enable intelligent decision-making in communications and security.

Reinforcement Learning for Edge Intelligence: Research exploring novel reinforcement learning algorithms and techniques tailored to edge intelligence architectures, emphasizing their ability to enable intelligent decision-making at the network edge.

Next-Generation Communications and Edge Intelligence: Investigations into how reinforcement learning can enhance next-generation communication systems, including 5G/6G networks, Internet of Things (IoT), and satellite communications, through edge intelligence.

Security and Privacy in Edge Intelligence: Studies on leveraging reinforcement learning to strengthen security and privacy mechanisms in edge-enabled communication systems, including zero-trust architectures, intrusion detection, and access control.

Zero-Trust Architecture and Reinforcement Learning: Explorations into how reinforcement learning can be integrated into zero-trust security frameworks to dynamically adapt security policies and defenses at the edge, ensuring trustworthiness in untrusted environments.

Federated Learning-Enabled Edge Intelligence: Research on the use of federated learning in conjunction with reinforcement learning to enable privacy-preserving edge intelligence, where local models are trained collaboratively without sharing raw data.

Resource Allocation and Optimization: Investigations into reinforcement learning-based resource allocation and optimization strategies for edge-enabled communication systems, including dynamic spectrum access, energy management, and computation offloading.

Dynamic Network Management and Control: Exploration of reinforcement learning algorithms for dynamic network management and control, including traffic routing, congestion control, and quality-of-service optimization.

Adaptive and Robust Communication Protocols: Development of adaptive and robust communication protocols based on reinforcement learning, which can dynamically adjust to time-varying networks and security threats.

Cooperative and Multi-Agent Reinforcement Learning: Investigation of cooperative and multi-agent reinforcement learning approaches for distributed edge intelligence in large-scale communication networks.

Real-World Applications and Case Studies: Case studies and real-world applications showcasing the effectiveness of reinforcement learning in edge intelligence for communications and security, including smart cities, industrial IoT, autonomous vehicles, and remote healthcare.

Interdisciplinary Challenges and Opportunities: Discussions on the interdisciplinary challenges faced in integrating reinforcement learning, edge intelligence, and next-generation communications, as well as opportunities for future research and collaboration.

Dr. Xiaozhen Lu
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • reinforcement learning
  • edge intelligence architecture
  • next-generation communications
  • security and privacy
  • zero-trust architecture
  • federated learning-enabled edge intelligence
  • resource allocation and optimization

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 1995 KiB  
Article
Design and Optimization of Hybrid CNN-DT Model-Based Network Intrusion Detection Algorithm Using Deep Reinforcement Learning
by Lu Qiu, Zhiping Xu, Lixiong Lin, Jiachun Zheng and Jiahui Su
Mathematics 2025, 13(9), 1459; https://doi.org/10.3390/math13091459 - 29 Apr 2025
Abstract
With the rapid development of network technology, modern systems are facing increasingly complex security threats, which motivates researchers to continuously explore more advanced intrusion detection systems (IDSs). Even though they work effectively in some situations, the existing IDSs based on machine learning or [...] Read more.
With the rapid development of network technology, modern systems are facing increasingly complex security threats, which motivates researchers to continuously explore more advanced intrusion detection systems (IDSs). Even though they work effectively in some situations, the existing IDSs based on machine learning or deep learning still struggle with detection accuracy and generalization. To address these challenges, this study proposes an innovative network intrusion detection algorithm that combines convolutional neural networks (CNNs) and decision trees (DTs) together, named CNN-DT algorithm. In the CNN-DT algorithm, CNN extracts high-level features from data packets first, then the decision tree quickly determines the presence of intrusions based on these high-level features, while providing a clear decision path. Moreover, the study proposes a novel adaptive hybrid pooling mechanism that integrates maximal pooling, average pooling, and global maximal pooling. The hyperparameters of the CNN network are also optimized by actor–critic (AC) deep reinforcement learning algorithm (DRL). The experimental results show that the CNN–decision tree (DT) algorithm optimized by actor–critic (AC) achieves an accuracy of 0.9792 on the KDD dataset, which is 5.63% higher than the unoptimized CNN-DT model. Full article
19 pages, 935 KiB  
Article
A Secure and Fair Federated Learning Framework Based on Consensus Incentive Mechanism
by Feng Zhu, Feng Hu, Yanchao Zhao, Bing Chen and Xiaoyang Tan
Mathematics 2024, 12(19), 3068; https://doi.org/10.3390/math12193068 - 30 Sep 2024
Cited by 1 | Viewed by 1532
Abstract
Federated learning facilitates collaborative computation among multiple participants while safeguarding user privacy. However, current federated learning algorithms operate under the assumption that all participants are trustworthy and their systems are secure. Nonetheless, real-world scenarios present several challenges: (1) Malicious clients disrupt federated learning [...] Read more.
Federated learning facilitates collaborative computation among multiple participants while safeguarding user privacy. However, current federated learning algorithms operate under the assumption that all participants are trustworthy and their systems are secure. Nonetheless, real-world scenarios present several challenges: (1) Malicious clients disrupt federated learning through model poisoning and data poisoning attacks. Although some research has proposed secure aggregation methods to address this issue, many methods have inherent limitations. (2) Clients may refuse or passively participate in the training process due to considerations of self-interest, and may even interfere with the training process due to competitive relationships. To overcome these obstacles, we have devised a reliable federated framework aimed at ensuring secure computing throughout the entirety of federated task processes. Initially, we propose a method for detecting malicious models to safeguard the integrity of model aggregation. Furthermore, we have proposed a fair contribution assessment method and awarded the right to write blocks to the creator of the optimal model, ensuring the active participation of participants in both local training and model aggregation. Finally, we establish a computational framework grounded in blockchain and smart contracts to uphold the integrity and fairness of federated tasks. To assess the efficacy of our framework, we conduct simulations involving various types of client attacks and contribution assessment scenarios using multiple open-source datasets. Results from these experiments demonstrate that our framework effectively ensures the credibility of federated tasks while achieving impartial evaluation of client contributions. Full article
Show Figures

Figure 1

Back to TopTop