{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:24:56Z","timestamp":1763810696166,"version":"3.41.0"},"reference-count":39,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T00:00:00Z","timestamp":1638748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Science and Technology Plan Project of Guangzhou City","award":["202002010003, 202102080279"],"award-info":[{"award-number":["202002010003, 202102080279"]}]},{"name":"Guangdong Special Project in Key Field of Artificial Intelligence for Ordinary University","award":["2019KZDZX1004"],"award-info":[{"award-number":["2019KZDZX1004"]}]},{"name":"Guangzhou Yuexiu District Science and Technology Plan Major Project","award":["2019-GX-010"],"award-info":[{"award-number":["2019-GX-010"]}]},{"name":"Taif Univer-sity Researchers Supporting Project","award":["TURSP-2020\/79"],"award-info":[{"award-number":["TURSP-2020\/79"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2022,8,31]]},"abstract":"<jats:p>Wireless body area network (WBAN) suffers secure challenges, especially the eavesdropping attack, due to constraint resources. In this article, deep reinforcement learning (DRL) and mobile edge computing (MEC) technology are adopted to formulate a DRL-MEC-based jamming-aided anti-eavesdropping (DMEC-JAE) scheme to resist the eavesdropping attack without considering the channel state information. In this scheme, a MEC sensor is chosen to send artificial jamming signals to improve the secrecy rate of the system. Power control technique is utilized to optimize the transmission power of both the source sensor and the MEC sensor to save energy. The remaining energy of the MEC sensor is concerned to ensure routine data transmission and jamming signal transmission. Additionally, the DMEC-JAE scheme integrates with transfer learning for a higher learning rate. The performance bounds of the scheme concerning the secrecy rate, energy consumption, and the utility are evaluated. Simulation results show that the DMEC-JAE scheme can approach the performance bounds with high learning speed, which outperforms the benchmark schemes.<\/jats:p>","DOI":"10.1145\/3453186","type":"journal-article","created":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T22:35:46Z","timestamp":1638830146000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["MEC-Based Jamming-Aided Anti-Eavesdropping with Deep Reinforcement Learning for WBANs"],"prefix":"10.1145","volume":"22","author":[{"given":"Guihong","family":"Chen","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Guangdong Polytechnic Normal University, Guangzhou, Guangdong, China"}]},{"given":"Xi","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Automation, Guangdong Polytechnic Normal University, Guangzhou, Guangdong, China"}]},{"given":"Mohammad","family":"Shorfuzzaman","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computers and Information Technology Taif University, Taif, Saudi Arabia"}]},{"given":"Ali","family":"Karime","sequence":"additional","affiliation":[{"name":"Royal Military College of Canada kingston, Canada"}]},{"given":"Yonghua","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Automation, Guangdong University of Technology, Guangzhou, Guangdong, China"}]},{"given":"Yuanhang","family":"Qi","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Zhongshan Institute, Zhongshan, Guangdong, China"}]}],"member":"320","published-online":{"date-parts":[[2021,12,6]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"IEEE. 2012. IEEE standard for local and metropolitan area networks: Part 15.6: Wireless body area networks. IEEE Std 802.15.6-2012 (Feb. 2012) 1\u2013271."},{"key":"e_1_3_1_3_2","article-title":"COVID-19 networking demand: An auction-based mechanism for automated selection of edge computing services","author":"Abdulsalam Yassine","year":"2020","unstructured":"Yassine Abdulsalam and M. Shamim Hossain. 2020. COVID-19 networking demand: An auction-based mechanism for automated selection of edge computing services. IEEE Transactions on Network Science and Engineering. Retrieved from https:\/\/ieeexplore.ieee.org\/document\/9205640.","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2012.2191295"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2964784"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2613997"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00007"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2889879"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800235"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2470644"},{"key":"e_1_3_1_11_2","article-title":"Scalable and communication-efficient decentralized federated edge learning with multi-blockchain framework","author":"Kang Jiawen","year":"2020","unstructured":"Jiawen Kang, Zehui Xiong, Chunxiao Jiang, Yi Liu, Song Guo, Yang Zhang, Dusit Niyato, Cyril Leung, and Chunyan Miao. 2020. Scalable and communication-efficient decentralized federated edge learning with multi-blockchain framework. arXiv:2008.04743. Retrieved from https:\/\/arxiv.org\/abs\/2008.04743.","journal-title":"arXiv:2008.04743"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844558"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2894824"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996461"},{"key":"e_1_3_1_15_2","article-title":"Deep anomaly detection for time-series data in industrial IoT: A communication-efficient on-device federated learning approach","author":"Liu Yi","year":"2020","unstructured":"Yi Liu, Sahil Garg, Jiangtian Nie, Yang Zhang, Zehui Xiong, Jiawen Kang, and M. Shamim Hossain. 2020. Deep anomaly detection for time-series data in industrial IoT: A communication-efficient on-device federated learning approach. IEEE Internet of Things Journal 8, 8 (2020), 6348\u20136358.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_1_16_2","article-title":"Privacy-preserving traffic flow prediction: A federated learning approach","author":"Liu Yi","year":"2020","unstructured":"Yi Liu, JQ James, Jiawen Kang, Dusit Niyato, and Shuyu Zhang. 2020. Privacy-preserving traffic flow prediction: A federated learning approach. IEEE Internet of Things Journal 7, 8 (2020), 7751\u20137763.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.01.1900525"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2020.09.009"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0355"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2038412"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2890685"},{"key":"e_1_3_1_22_2","unstructured":"Volodymyr Mnih Koray Kavukcuoglu David Silver Alex Graves Ioannis Antonoglou Daan Wierstra and Martin Riedmiller. 2013. Playing atari with deep reinforcement learning. ArXiv:1312.5602. Retrieved from https:\/\/arxiv.org\/abs\/1312.5602."},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2566446"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3276"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012314.00178"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130908"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2924015"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.1998.712192"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2679063"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2020.08.003"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2841033"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.5555\/3154546"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2782726"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2019.8927946"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2582379"},{"key":"e_1_3_1_38_2","article-title":"Learning to dispatch for job shop scheduling via deep reinforcement learning","volume":"33","author":"Zhang Cong","year":"2020","unstructured":"Cong Zhang, Wen Song, Zhiguang Cao, Jie Zhang, Puay Siew Tan, and Xu Chi. 2020. Learning to dispatch for job shop scheduling via deep reinforcement learning. Advances in Neural Information Processing Systems 33, (2020). ArXiv:2010.12367. Retrieved from https:\/\/arxiv.org\/abs\/2010.12367.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2269049"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254089"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3453186","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3453186","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:39Z","timestamp":1750195719000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3453186"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,6]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,8,31]]}},"alternative-id":["10.1145\/3453186"],"URL":"https:\/\/doi.org\/10.1145\/3453186","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2021,12,6]]},"assertion":[{"value":"2020-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}