Advanced Search
Turn off MathJax
Article Contents
CHEN Haoyu, XIAO Liang, XU Xiaoyu, LI Jieling, WANG Zicheng, LIU Huanhuan, CHEN Hongyi. Physical Layer Security Game for Large Language Model-Based Inference in the Maritime Network[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT251269
Citation: CHEN Haoyu, XIAO Liang, XU Xiaoyu, LI Jieling, WANG Zicheng, LIU Huanhuan, CHEN Hongyi. Physical Layer Security Game for Large Language Model-Based Inference in the Maritime Network[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT251269

Physical Layer Security Game for Large Language Model-Based Inference in the Maritime Network

doi: 10.11999/JEIT251269 cstr: 32379.14.JEIT251269
Funds:  National Natural Science Foundation of China (U25A20388), Fundamental Research Funds for the Central Universities (20720250036), National Key Research and Development Program of China (2023YFB3107603)
  • Accepted Date: 2026-02-10
  • Rev Recd Date: 2026-02-10
  • Available Online: 2026-03-04
  •   Objective  The physical-layer security game reveals the interaction between user equipment (UE) and attackers, and provides performance bounds of anti-jamming transmission and physical-layer authentication schemes based on the equilibriums. However, existing game models overlook smart attackers that send jamming or spoofing signals, fail to account for the maritime wireless channels affected by evaporation ducts and sea wave fluctuations, and are difficult to evaluate the performance of large language models (LLMs)-based inference, such as the vessel traffic monitoring.  Methods  The anti-jamming maritime communication game for LLM inference is formulated, where the jammer first selects the jamming power and channel to reduce the signal-to-interference-plus-noise ratio at the server with less jamming cost, and the UEs then choose transmit power, channel, LLM sparsity ratio and control center to send sensing data (e.g., images, temperature, and humidity) to enhance the inference accuracy with less latency. The physical-layer authentication game for maritime wireless networks with LLM inference is further formulated. The spoofing attacker first selects the number of spoofing packets to degrade authentication accuracy with less cost. The control center then selects the fast authentication mode based on channel state or the safe authentication mode based on the received signal strength and the arrival interval of the packet from multiple ambient transmitters, and the test threshold to increase accuracy with less cost.  Results and Discussions  Based on the Stackelberg equilibrium (SE) under the LLM with 7 billion parameters, the performance bounds of the reinforcement learning (RL)-based anti-jamming inference scheme are provided to reveal the impact of evaporation duct height, wave height, maximum sparsity ratio of LLM and the quantization level on inference accuracy and latency. In addition, the performance bounds of the RL-based maritime spoofing detection scheme are provided based on the SE of the physical-layer authentication game to show the impact of the maximum number of spoofing packets on the authentication accuracy. Simulations are carried out based on the five UEs with the antenna height of 3 meters offloading the image, temperature and humidity using the transmit power up to 200 mW at 5.8 GHz with a bandwidth of 20 MHz to five control centers with antenna heights of 6 m. The jammer applies Deep Q-Network to choose the jamming power with a maximum transmit power of 200 mW for each 5.8 GHz channel, and the spoofing attacker applies the Deep Q-Network to select the number of spoofing packets up to 100. The results show that the inference accuracy and latency of the RL-based anti-jamming maritime communication scheme for LLM inference converge to the performance bounds with gaps of less than 0.6% after 2500 time slots. In addition, the RL-based authentication scheme converges after 1000 time slots with the gap of less than 1.6%.  Conclusions  In this paper, we have formulated the maritime physical-layer security game for LLM inference, addressing scenarios such as anti-jamming sensing data transmission and spoofing detection, aiming at investigating how UEs determine transmit power and channel, and how the control center selects authentication modes and test thresholds to enhance the physical-layer security mechanisms. The attacker chooses attack modes and parameters to degrade the inference accuracy, increase latency, and even cause denial-of-service. Based on the SE and the conditions, the performance bounds of the inference accuracy increase with the maximum transmit power and linearly decrease with the sparsity ratio. Furthermore, the impact of the maximum number of spoofing packets on the inference accuracy is provided. Simulation results show that the RL-based maritime physical-layer security schemes converge to the performance bounds, thereby validating the accuracy and effectiveness of the game model.
  • loading
  • [1]
    范超琼, 赵成林, 李斌. 无人机网络中基于分层博弈的干扰对抗频谱接入优化[J]. 通信学报, 2020, 41(6): 26–33. doi: 10.11959/j.issn.1000-436x.2020114.

    FAN Chaoqiong, ZHAO Chenglin, and LI Bin. Hierarchical game based spectrum access optimization for anti-jamming in UAV network[J]. Journal on Communications, 2020, 41(6): 26–33. doi: 10.11959/j.issn.1000-436x.2020114.
    [2]
    韩晨, 刘爱军, 安康, 等. 干扰环境下基于博弈论的无人机群部署与组网方法[J]. 电子与信息学报, 2022, 44(3): 860–870. doi: 10.11999/JEIT210992.

    HAN Chen, LIU Aijun, AN Kang, et al. Deployment and networking methods of UAV swarm in jamming environments based on game theory[J]. Journal of Electronics & Information Technology, 2022, 44(3): 860–870. doi: 10.11999/JEIT210992.
    [3]
    李刚, 吴麒, 王翔, 等. 基于样本信息熵辅助的深度强化学习抗干扰策略[J]. 通信学报, 2024, 45(9): 115–128. doi: 10.11959/j.issn.1000-436x.2024161.

    LI Gang, WU Qi, WANG Xiang, et al. Deep reinforcement learning-empowered anti-jamming strategy aided by sample information entropy[J]. Journal on Communications, 2024, 45(9): 115–128. doi: 10.11959/j.issn.1000-436x.2024161.
    [4]
    WANG Haichao, DING Guoru, CHEN Jin, et al. UAV anti-jamming communications with power and mobility control[J]. IEEE Transactions on Wireless Communications, 2023, 22(7): 4729–4744. doi: 10.1109/TWC.2022.3228265.
    [5]
    ZHOU Yi, YEOH P L, KIM K J, et al. Game theoretic physical layer authentication for spoofing detection in UAV communications[J]. IEEE Transactions on Vehicular Technology, 2022, 71(6): 6750–6755. doi: 10.1109/TVT.2022.3161006.
    [6]
    PIANA M, ARDIZZON F, and TOMASIN S. Challenge-response to authenticate drone communications: A game theoretic approach[J]. IEEE Transactions on Information Forensics and Security, 2025, 20: 4890–4903. doi: 10.1109/TIFS.2025.3566534.
    [7]
    LU Xiaozhen, XIAO Liang, XU Tangwei, et al. Reinforcement learning based PHY authentication for VANETs[J]. IEEE Transactions on Vehicular Technology, 2020, 69(3): 3068–3079. doi: 10.1109/TVT.2020.2967026.
    [8]
    ABDRABOU M and GULLIVER T A. Game theoretic spoofing detection for space information networks using physical attributes[J]. IEEE Transactions on Communications, 2024, 72(7): 3947–3956. doi: 10.1109/TCOMM.2024.3370433.
    [9]
    LV Zefang, XIAO Liang, DU Yousong, et al. Multi-agent reinforcement learning based UAV swarm communications against jamming[J]. IEEE Transactions on Wireless Communications, 2023, 22(12): 9063–9075. doi: 10.1109/TWC.2023.3268082.
    [10]
    苏新, 孟蕾蕾, 周一青, 等. 基于深度强化学习的海洋移动边缘计算卸载方法[J]. 通信学报, 2022, 43(10): 133–145. doi: 10.11959/j.issn.1000-436x.2022197.

    SU Xin, MENG Leilei, ZHOU Yiqing, et al. Maritime mobile edge computing offloading method based on deep reinforcement learning[J]. Journal on Communications, 2022, 43(10): 133–145. doi: 10.11959/j.issn.1000-436x.2022197.
    [11]
    WANG Ziyuan, DU Jun, JIANG Chunxiao, et al. UAV-assisted target tracking and computation offloading in USV-based MEC networks[J]. IEEE Transactions on Mobile Computing, 2024, 23(12): 11389–11405. doi: 10.1109/TMC.2024.3396121.
    [12]
    REN Yuzheng, ZHANG Haijun, YU F R, et al. Industrial internet of things with large language models (LLMs): An intelligence-based reinforcement learning approach[J]. IEEE Transactions on Mobile Computing, 2025, 24(5): 4136–4152. doi: 10.1109/TMC.2024.3522130.
    [13]
    ZHANG Hanzhong, ZHOU Ting, XU Tianheng, et al. Statistical modeling of evaporation duct channel for maritime broadband communications[J]. IEEE Transactions on Vehicular Technology, 2022, 71(10): 10228–10240. doi: 10.1109/TVT.2022.3187753.
    [14]
    李博, 刘博文, 杨洪娟, 等. 海洋环境下无人机通信感知一体化波形设计[J]. 电子与信息学报, 2025, 47(4): 958–967. doi: 10.11999/JEIT240446.

    LI Bo, LIU Bowen, YANG Hongjuan, et al. Waveform design of UAV-enabled integrated sensing and communication in marine environment[J]. Journal of Electronics & Information Technology, 2025, 47(4): 958–967. doi: 10.11999/JEIT240446.
    [15]
    IM H S and LEE S H. Anti-jamming games in multi-band wireless ad hoc networks[J]. IEEE Transactions on Information Forensics and Security, 2023, 18: 872–887. doi: 10.1109/TIFS.2022.3227422.
    [16]
    SHI Bai, SHAO Huaizong, LIN Jingran, et al. Jamming the relay-assisted multi-user wireless communication system: A zero-sum game approach[J]. IEEE Transactions on Information Forensics and Security, 2023, 18: 3198–3211. doi: 10.1109/TIFS.2023.3277222.
    [17]
    GARNAEV A, PETROPULU A P, TRAPPE W, et al. A jamming game with rival-type uncertainty[J]. IEEE Transactions on Wireless Communications, 2020, 19(8): 5359–5372. doi: 10.1109/TWC.2020.2992665.
    [18]
    石嘉, 李安童, 李赞, 等. 面向重大活动电磁安全管控的协同电磁压制方法[J]. 电子与信息学报, 2024, 46(5): 1908–1919. doi: 10.11999/JEIT231318.

    SHI Jia, LI Antong, LI Zan, et al. Collaborative electromagnetic suppression method for electromagnetic security control of major events[J]. Journal of Electronics & Information Technology, 2024, 46(5): 1908–1919. doi: 10.11999/JEIT231318.
    [19]
    周恒杰, 孙闽红, 钟华, 等. 基于不完全信息动态博弈的多信道无线网络抗干扰传输[J]. 电信科学, 2018, 34(2): 39–45. doi: 10.11959/j.issn.1000-0801.2018004.

    ZHOU Hengjie, SUN Minhong, ZHONG Hua, et al. Anti-jamming transmission in a multi-channel wireless network based on incomplete information dynamic game[J]. Telecommunications Science, 2018, 34(2): 39–45. doi: 10.11959/j.issn.1000-0801.2018004.
    [20]
    SHENG Ying, ZHENG Lianmin, YUAN Binhang, et al. FlexGen: High-throughput generative inference of large language models with a single GPU[C]. Proceedings of the 40th International Conference on Machine Learning, Honolulu, USA, 2023: 31094–31116.
    [21]
    LIU Haotian, LI Chunyuan, WU Qingyang, et al. Visual instruction tuning[C]. Proceedings of the 37th International Conference on Neural Information Processing Systems, New Orleans, USA, 2023: 1516.
    [22]
    林志平, 肖亮, 陈宏毅, 等. 面向大语言模型的抗干扰协同推断技术[J]. 电子与信息学报, 2025, 47(11): 4572–4582. doi: 10.11999/JEIT250675.

    LIN Zhiping, XIAO Liang, CHEN Hongyi, et al. Collaborative inference for large language models against jamming attacks[J]. Journal of Electronics & Information Technology, 2025, 47(11): 4572–4582. doi: 10.11999/JEIT250675.
    [23]
    YAO Shanliang, GUAN Runwei, WU Zhaodong, et al. WaterScenes: A multi-task 4D radar-camera fusion dataset and benchmarks for autonomous driving on water surfaces[J]. IEEE Transactions on Intelligent Transportation Systems, 2024, 25(11): 16584–16598. doi: 10.1109/TITS.2024.3415772.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(5)  / Tables(1)

    Article Metrics

    Article views (29) PDF downloads(4) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return