Semantic IoT Transformation: Elevating Wireless Networking Performance through Innovative Communication Paradigms
Received: 10 May 2024 | Revised: 29 May 2024 2024 | Accepted: 6 June 2024 | Online: 2 August 2024
Corresponding author: Ibrahim R. Alzahrani
Abstract
This paper addresses the privacy concerns inherent in semantic communication within the Internet of Things (IoT) and proposes a Secure Semantic Communication Framework (SSCF) to ascertain confidentiality and communication accuracy without compromising semantic integrity. The proposed framework uses the Advanced Encryption Standard (AES) for encryption to address privacy breaches in semantic communication. Additionally, it introduces a novel approach employing Deep Q-Networks (DQN) for adversarial training to maintain semantic communication accuracy in both unencrypted and encrypted modes. SSCF combines universality and confidentiality, ensuring secure and efficient semantic communication. Experimental evaluations showed that SSCF, with its adversarial encryption learning scheme, effectively ensures communication accuracy and privacy. Regardless of encryption status, SSCF significantly hinders attackers from restoring original semantic data from intercepted messages. The integration of heuristic algorithms enhances performance and security. The proposed framework is based on a shared database for training network modules. The originality of the proposed approach lies in the introduction of a DQN-based adversarial training technique to balance confidentiality and semantic communication accuracy, address key privacy concerns, and enhance the security and reliability of IoT communication systems.
Keywords:
AES, DQN, SSCF, semantic communication, privacy-preserving, IoTDownloads
References
M. Anwer, S. M. Khan, M. U. Farooq, and Waseemullah, "Attack Detection in IoT using Machine Learning," Engineering, Technology & Applied Science Research, vol. 11, no. 3, pp. 7273–7278, Jun. 2021.
Y. Wang, W. Yang, P. Guan, Y. Zhao, and Z. Xiong, "STAR-RIS-Assisted Privacy Protection in Semantic Communication System," IEEE Transactions on Vehicular Technology, pp. 1–6, 2024.
Y. Wang, Z. Tian, Y. Sun, X. Du, and N. Guizani, "Preserving Location Privacy in UASN through Collaboration and Semantic Encapsulation," IEEE Network, vol. 34, no. 4, pp. 284–290, Jul. 2020.
X. Luo et al., "A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment," IEEE Access, vol. 8, pp. 67192–67204, 2020.
W. Iqbal, H. Abbas, B. Rauf, Y. A. Bangash, M. F. Amjad, and A. Hemani, "PCSS: Privacy Preserving Communication Scheme for SDN Enabled Smart Homes," IEEE Sensors Journal, vol. 22, no. 18, pp. 17677–17690, Sep. 2022.
G. S. Poh, P. Gope, and J. Ning, "PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment," IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1095–1107, Feb. 2021.
J. N. Liu, J. Weng, A. Yang, Y. Chen, and X. Lin, "Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing-Based Smart Grid," IEEE Transactions on Smart Grid, vol. 11, no. 1, pp. 247–257, Jan. 2020.
R. Tan, Y. Tao, W. Si, and Y. Y. Zhang, "Privacy preserving semantic trajectory data publishing for mobile location-based services," Wireless Networks, vol. 26, no. 8, pp. 5551–5560, Nov. 2020.
C. Iwendi, S. A. Moqurrab, A. Anjum, S. Khan, S. Mohan, and G. Srivastava, "N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets," Computer Communications, vol. 161, pp. 160–171, Sep. 2020.
S. A. Moqurrab, A. Anjum, N. Tariq, and G. Srivastava, "Instant_Anonymity: A Lightweight Semantic Privacy Guarantee for 5G-Enabled IIoT," IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 951–959, Jan. 2023.
W. Yang et al., "Semantic Communication Meets Edge Intelligence," IEEE Wireless Communications, vol. 29, no. 5, pp. 28–35, Oct. 2022.
H. Kiya, T. Nagamori, S. Imaizumi, and S. Shiota, "Privacy-Preserving Semantic Segmentation Using Vision Transformer," Journal of Imaging, vol. 8, no. 9, Sep. 2022, Art. no. 233.
R. Bi, J. Xiong, Y. Tian, Q. Li, and K. K. R. Choo, "Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles," IEEE Internet of Things Journal, vol. 10, no. 3, pp. 2314–2329, Oct. 2023.
Y. Cai, S. Zhang, H. Xia, Y. Fan, and H. Zhang, "A Privacy-Preserving Scheme for Interactive Messaging Over Online Social Networks," IEEE Internet of Things Journal, vol. 7, no. 8, pp. 6817–6827, Dec. 2020.
J. Chen, J. Wang, C. Jiang, Y. Ren, and L. Hanzo, "Trustworthy Semantic Communications for the Metaverse Relying on Federated Learning," IEEE Wireless Communications, vol. 30, no. 4, pp. 18–25, Aug. 2023.
W. Ma et al., "FedSH: Towards Privacy-Preserving Text-Based Person Re-Identification," IEEE Transactions on Multimedia, vol. 26, pp. 5065–5077, 2024.
H. Mun, M. Seo, and D. H. Lee, "Secure Privacy-Preserving V2V Communication in 5G-V2X Supporting Network Slicing," IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 9, pp. 14439–14455, Sep. 2022.
X. Ding, H. Fang, Z. Zhang, K. K. R. Choo, and H. Jin, "Privacy-Preserving Feature Extraction via Adversarial Training," IEEE Transactions on Knowledge and Data Engineering, vol. 34, no. 4, pp. 1967–1979, Apr. 2022.
X. Liu et al., "SemProtector: A Unified Framework for Semantic Protection in Deep Learning-based Semantic Communication Systems," IEEE Communications Magazine, vol. 61, no. 11, pp. 56–62, Nov. 2023.
Y. Wang, S. Guo, Y. Deng, H. Zhang, and Y. Fang, "Privacy-Preserving Task-Oriented Semantic Communications Against Model Inversion Attacks," IEEE Transactions on Wireless Communications, 2024.
L. Zhao, D. Wu, and L. Zhou, "Data Utilization Versus Privacy Protection in Semantic Communications," IEEE Wireless Communications, vol. 30, no. 3, pp. 44–50, Jun. 2023.
S. Cheng, X. Zhang, Y. Sun, Q. Cui, and X. Tao, "Knowledge Discrepancy Oriented Privacy Preserving for Semantic Communication," IEEE Transactions on Vehicular Technology, pp. 1–10, 2024.
M. Min, W. Wang, L. Xiao, Y. Xiao, and Z. Han, "Reinforcement learning-based sensitive semantic location privacy protection for VANETs," China Communications, vol. 18, no. 6, pp. 244–260, Jun. 2021.
M. Rodriguez-Garcia, M. Batet, D. Sánchez, and A. Viejo, "Privacy protection of user profiles in online search via semantic randomization," Knowledge and Information Systems, vol. 63, no. 9, pp. 2455–2477, Sep. 2021.
G. Qiu, G. Tang, C. Li, D. Guo, Y. Shen, and Y. Gan, "Behavioral-Semantic Privacy Protection for Continual Social Mobility in Mobile-Internet Services," IEEE Internet of Things Journal, vol. 11, no. 1, pp. 462–477, Jan. 2024.
G. Shi, Y. Xiao, Y. Li, and X. Xie, "From Semantic Communication to Semantic-Aware Networking: Model, Architecture, and Open Problems," IEEE Communications Magazine, vol. 59, no. 8, pp. 44–50, Aug. 2021.
M. Balfaqih, "Enhancing Security and Flexibility in Smart Locker Systems: A Multi-Authentication Approach with IoT Integration," in 2024 21st Learning and Technology Conference (L&T), Jeddah, Saudi Arabia, Jan. 2024, pp. 325–329.
"Datasets | European Parliament’s Open Data Portal." https://data.europarl.europa.eu/en/datasets?language=en&order=RELEVANCE.
Downloads
How to Cite
License
Copyright (c) 2024 Ibrahim Alzahrani
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.