CN108235423A - Wireless communication anti-eavesdrop jamming power control algolithm based on Q study - Google Patents

Wireless communication anti-eavesdrop jamming power control algolithm based on Q study Download PDF

Info

Publication number
CN108235423A
CN108235423A CN201711475264.2A CN201711475264A CN108235423A CN 108235423 A CN108235423 A CN 108235423A CN 201711475264 A CN201711475264 A CN 201711475264A CN 108235423 A CN108235423 A CN 108235423A
Authority
CN
China
Prior art keywords
jamming power
time slot
jammer
friendly
power
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711475264.2A
Other languages
Chinese (zh)
Other versions
CN108235423B (en
Inventor
肖亮
毛毛雨
康显桂
安宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
Original Assignee
Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sun Yat Sen University filed Critical Sun Yat Sen University
Priority to CN201711475264.2A priority Critical patent/CN108235423B/en
Publication of CN108235423A publication Critical patent/CN108235423A/en
Application granted granted Critical
Publication of CN108235423B publication Critical patent/CN108235423B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/18TPC being performed according to specific parameters
    • H04W52/24TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
    • H04W52/243TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters taking into account interferences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/43Jamming having variable characteristics characterized by the control of the jamming power, signal-to-noise ratio or geographic coverage area
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a kind of wireless communication anti-eavesdrop jamming power control algolithms based on Q study, include the following steps:S1. initialization transmission power Ps, security evaluation coefficient ρ, jamming power xiWith the grade t of working times, by the working time t of Edge ServersK part is averagely divided into, is denoted as a time slotS2. k-th of time slot is calculatedThe correlative of working condition;S3. friendly jammer is learnt using Q learning algorithms, in each time slotAccording to system mode S(k)It makes a policy, selects corresponding action xi (k);S4. after Edge Server completes Q learning trainings, friendly jammer is according to current state S in Q value tables(k)It is correspondingEquation scheduling actionsSend friendly interference signal.The present invention trains jammer by Q learning algorithms, it can be continuously attempted to according to the information transmission power of legitimate sender, emit jamming power, it is finally reached best jamming power, so as to obtain the minimum of the maximization of information security and network energy loss, the ideal effect of network energy utilization rate is improved.

Description

Wireless communication anti-eavesdrop jamming power control algolithm based on Q study
Technical field
The present invention relates to machine learning and safety of physical layer field, more particularly, to a kind of channel radio based on Q study Believe anti-eavesdrop jamming power control algolithm.
Background technology
Friendly jammer is interfered with certain power emission, it is intended to be interfered listener-in, be made it that can not intercept legal transmission The information that machine is sent, so as to ensure its confidentiality.The adjusting of friendly jammer interference power has secrecy effect most important Influence.Jamming power is excessive, and jammer interference listener-in while can also interfere with the information transmission on main channel, and it is legal to cause Recipient can not restore the information that sender is transmitted, and more consume a large amount of energy, increase the energy consumption of network;If interference Power is too small, and listener-in remains able to eavesdropping most information, and secrecy effect is not achieved.Jammer is needed by perceiving legal hair The information transmission power for the person of sending is so as to the jamming power of itself, make and rationally be provided and selected.
The paper of 2013《Physical Layer Securityfor Two-Way UntrustedRelaying With FriendlyJammers》It is middle to propose optimal jamming power algorithm, it is to establish mould by measuring computable quantity of state Type is interfered with constant optimal power, so as to fulfill the confidentiality of communication channel.Paper《Ally Friendly Jamming:How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time》It proposes to use key suitable control close friend's interference signal, it is unpredictable for unwarranted equipment to make it Interference, and legitimate receiver can be restored according to key, but key is once stolen hearer obtains, it will be difficult in the short time It was found that and effective protection secret information.Paper《Secure Communication through Wireless-Powered Friendly Jamming:Jointly Online Optimization over Geography,Energy and Time、 Competing mobile network game:Embracing antijamming andjammingstrategies with reinforcement learning》It is to carry out intensified learning for factors such as channel check and correction, interference unit geographical location arrangements, it is false Determine premise and be in alignment with channel to interfere successfully.But the information transmission power of sender is typically due to the geographical position of legal recipient It puts, receive the factors such as power, decoding capability and change fluctuation.
Invention content
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of wireless communication anti-eavesdrops based on Q study Jamming power control algolithm trains jammer by Q learning algorithms, can be according to the information transmission power of legitimate sender It continuously attempts to, emits jamming power, be finally reached best jamming power
To solve the above problems, technical solution provided by the invention is:A kind of wireless communication anti-eavesdrop based on Q study is done Power control algorithm is disturbed, is included the following steps:
S1. initialization transmission power Ps, security evaluation coefficient ρ, jamming power xiWith the grade t of working times, by edge The working time t of serversK part is averagely divided into, is denoted as a time slot
S2. k-th of time slot is calculatedThe correlative of working condition;
S3. friendly jammer is learnt using Q learning algorithms, in each time slotAccording to system mode S(k)It makes a policy, The corresponding action x of selectioni (k)
S4. after Edge Server completes Q learning trainings, friendly jammer is according to current state S in Q value tables(k)It is correspondingEquation scheduling actionsSend friendly interference signal.
Further, the S1 steps include:
S101. by transmission power PsN grades are averagely divided into, note transmission power integrates as L, enables L=[P1,P2,···,Pn];
S102. determine that legitimate sender cooperates with security evaluation coefficient ρ, the ρ ∈ [0,1] made with recipient;
S103. by legitimate sender transmission power Ps, security evaluation coefficient ρ merge to obtain state set, be denoted as S, S= [Ps, ρ];
S104. the jamming power of friendly jammer is averagely divided into n grades, remembers the jamming power behavior aggregate of friendly jammer For A, A=[x are enabled1,x2,···,xn];
S105. by the working time t of Edge ServersK part is averagely divided into, is denoted as a time slot ts(k)。
Further, the S2 steps include:
S201. it is λ to determine channel fading coefficient, λ ∈ [0,1], measures legitimate sender to the distance d of recipientsr, it is legal Sender is to the distance d of listener-inse, friendly jammer to listener-in distance be dje
It calculates listener-in and eavesdrops information obtained by channel:
S202. information obtained by legitimate receiver is calculated:Wherein θ ∈ [0,1] is are encrypting Under technology helps, legal recipient is to the immunity programm of interference;
S203. metrical information secrecy capacity C (P are calculateds (k),xi (k)):
C(Ps (k),xi (k))=log (γr(Ps (k),xi (k)))-log(γe(Ps (k),xi (k)))
S204. computational security information content I (S(k),xi (k)):
I(S(k),xi (k))=ρ(k)C(Ps (k),xi (k))
S205. measuring system energy loss E is calculateds(xi (k)):
Es(xi (k))=xi (k)Ei+xi (k)Ev+ηEn
Wherein, EiTo measure friendly jammer rate of Energy Loss, EvEnergy loss, E are calculated for Edge ServernIt is normal Advise information transmission energy loss, note η be regular coefficients, η ∈ [0,1];
S206. the secrecy capacity and energy loss, calculating obtained according to above-mentioned measurement wirelessly communicates anti-eavesdrop jamming power The immediate effect function of control algolithm:
U(S(k), xi (k))=I (S(k), xi (k))-Es(xi (k))。
Further, the S3 steps specifically include:
S301. the state set and jammer interference power behavior aggregate formed according to the transmission power of legitimate sender initializes Q matrixes;Order matrix V=mn, m >=0, n >=0, and list Q value tables;The learning rate of default Q study and the attenuation of following attention degree Coefficient be respectively α ∈ (0,1], δ ∈ (0,1], adjust α, δ to suitable value;
S302. the transmission power P of k-th of time slot legitimate sender is measureds (k), security evaluation coefficient ρ(k), obtain state value S(k);Inquire S in Q value tables(k)Corresponding optimal jamming power xi *, optimal scheduling probability is remembered for (1- ε), ε ∈ (0,1];Pass through plan Transfer at this time is slightly selected to act, adjusts ε to appropriate value;
S303. work as k=1, at the beginning gapDue to can not measuring state S1One jamming power action of random selection When k >=2, it is S to measure measuring state in k time slots(k), friendly jammer interference power isEdge Server passes through at this time The formula of S206 steps calculates the immediate effect U (S that this training obtains(k),xi (k));
S304. at the end of time slot k, the transmitting work(of (k+1) a time slot sender is measured according to step S101 to S104 Rate Ps (k+1)With security evaluation coefficient ρ(k+1), so that it is determined that the state value S of next time slot(k+1)
S305. friendly jammer is updated in state S(k)Under takeThe Q equations of action and pass through optimal actionIt obtains V equations;Edge Server is according to formula:
S306. step S302 to step S305 is repeated, until obtaining a convergent ideal Q value table.
In the present invention, it is calculated using the Q learning algorithms design wireless communication anti-eavesdrop jamming power control in intensified learning Method.Since all it is difficult to predict Q study is calculated for the anti-interference degree of communication channel, energy loss, transmission power fluctuation in communication process Method training jammer can cooperate with what is decided through consultation according to information transmission power, the legitimate sender of legitimate sender with recipient Security evaluation coefficient is continuously attempted to, and is emitted jamming power, best jamming power is finally reached, so as to obtain information security Property maximization and network energy loss minimum, improve network energy utilization rate ideal effect.
The Core Superiority of Q learning algorithms is that it is a kind of deep learning algorithm of model-free.It without to quantity of state into Row is precisely specific to be measured, and only relevant operating conditions need to be observed in the course of work of equipment and be passed through Markov and determined Plan process will feed back maximizing the benefits, and then Q functions, which are updated, can continue to optimize decision.The present invention is in unknown signaling mould In the case of type, the peace decided through consultation is cooperateed with recipient based on transmission power continually changing by environmental fluctuating, legitimate sender Full metewand generation state space, the retrievable information content such as energy loss is considered and is included in benefit function, is solved due to closing The problem of key physical quantity can not measure and be difficult to optimize friendly jamming power.Further, it is best to be finally reached balance for optimization The state of balance between jamming power and energy loss, so as to obtain the maximization of information security and network energy loss It minimizes, improves the ideal effect of network energy utilization rate.
Compared with prior art, advantageous effect is:A kind of wireless communication anti-eavesdrop based on Q study provided by the invention is done Power control algorithm is disturbed, considers the interference performance of interference unit and the energy loss problem of Edge Server, learns to calculate using Q Method does not need to measure specific energy loss, information content, only attempts to can obtain by iteration optimal;It is instructed by Q learning algorithms Practice jammer, can be continuously attempted to according to the information transmission power of legitimate sender, emit jamming power, be finally reached most Good jamming power so as to obtain the minimum of the maximization of information security and network energy loss, improves network energy profit With the ideal effect of rate.
Description of the drawings
Fig. 1 is the method for the present invention flow chart.
Fig. 2 is functional structure chart of the present invention.
Specific embodiment
As shown in Figure 1, a kind of wireless communication anti-eavesdrop jamming power control algolithm based on Q study, includes the following steps:
Step 1:Initialize transmission power Ps, security evaluation coefficient ρ, jamming power xiWith the grade t of working times
S101. by transmission power PsN grades are averagely divided into, note transmission power integrates as L, enables L=[P1,P2,···,Pn];
S102. determine that legitimate sender cooperates with security evaluation coefficient ρ, the ρ ∈ [0,1] made with recipient;
S103. by legitimate sender transmission power Ps, security evaluation coefficient ρ merge to obtain state set, be denoted as S, S= [Ps, ρ];
S104. the jamming power of friendly jammer is averagely divided into n grades, remembers the jamming power behavior aggregate of friendly jammer For A, A=[x are enabled1,x2,···,xn];
S105. by the working time t of Edge ServersK part is averagely divided into, is denoted as a time slot
Step 2:Calculate k-th of time slotThe correlative of working condition.
S201. it is λ to determine channel fading coefficient, λ ∈ [0,1], measures legitimate sender to the distance d of recipientsr, it is legal Sender is to the distance d of listener-inse, friendly jammer to listener-in distance be dje
It calculates listener-in and eavesdrops information obtained by channel:
S202. information obtained by legitimate receiver is calculated:Wherein θ ∈ [0,1] is are encrypting Under technology helps, legal recipient is to the immunity programm of interference;
S203. metrical information secrecy capacity C (P are calculateds (k),xi (k)):
C(Ps (k),xi (k))=log (γr(Ps (k),xi (k)))-log(γe(Ps (k),xi (k)))
S204. computational security information content I (S(k),xi (k)):
I(S(k),xi (k))=ρ(k)C(Ps (k),xi (k))
S205. measuring system energy loss E is calculateds(xi (k)):
Es(xi (k))=xi (k)Ei+xi (k)Ev+ηEn
Wherein, EiTo measure friendly jammer rate of Energy Loss, EvEnergy loss, E are calculated for Edge ServernIt is normal Advise information transmission energy loss, note η be regular coefficients, η ∈ [0,1];
S206. the secrecy capacity and energy loss, calculating obtained according to above-mentioned measurement wirelessly communicates anti-eavesdrop jamming power The immediate effect function of control algolithm:
U(S(k), xi (k))=I (S(k), xi (k))-Es(xi (k))。
Step 3:Friendly jammer is learnt using Q learning algorithms, in each time slotAccording to system mode S(k)It makes certainly Plan selects corresponding action xi (k)
S301. the state set and jammer interference power behavior aggregate formed according to the transmission power of legitimate sender initializes Q matrixes;Order matrix V=mn, m >=0, n >=0, and list Q value tables;The learning rate of default Q study and the attenuation of following attention degree Coefficient be respectively α ∈ (0,1], δ ∈ (0,1], adjust α, δ to suitable value;
S302. the transmission power P of k-th of time slot legitimate sender is measureds (k), security evaluation coefficient ρ(k), obtain state value S(k);Inquire S in Q value tables(k)Corresponding optimal jamming powerOptimal scheduling probability is remembered for (1- ε), ε ∈ (0,1];Pass through plan Transfer at this time is slightly selected to act, such as:It is acted, is denoted as with the probability selection optimal scheduling of (1- ε)With the probability of ε with Machine selects remaining scheduling actions in addition to optimal, is denoted as x-i, ε is adjusted to appropriate value;
S303. work as k=1, at the beginning gapDue to can not measuring state S1One jamming power action of random selection When k >=2, it is S to measure measuring state in k time slots(k), friendly jammer interference power isEdge Server passes through at this time The formula of S206 steps calculates the immediate effect U (S that this training obtains(k),xi (k));
S304. at the end of time slot k, the transmitting work(of (k+1) a time slot sender is measured according to step S101 to S104 Rate Ps (k+1)With security evaluation coefficient ρ(k+1), so that it is determined that the state value S of next time slot(k+1)
S305. friendly jammer is updated in state S(k)Under takeThe Q equations of action and pass through optimal actionIt obtains V equations;Edge Server is according to formula:
S306. step S302 to step S305 is repeated, until obtaining a convergent ideal Q value table.
Step 4:After Edge Server completes Q learning trainings, friendly jammer is according to current state S in Q value tables(k)It is corresponding 'sEquation scheduling actionsSend friendly interference signal.
Obviously, the above embodiment of the present invention be only to clearly illustrate example of the present invention, and not be pair The restriction of embodiments of the present invention.For those of ordinary skill in the art, may be used also on the basis of the above description To make other variations or changes in different ways.There is no necessity and possibility to exhaust all the enbodiments.It is all this All any modification, equivalent and improvement made within the spirit and principle of invention etc., should be included in the claims in the present invention Protection domain within.

Claims (4)

1. a kind of wireless communication anti-eavesdrop jamming power control algolithm based on Q study, which is characterized in that include the following steps:
S1. initialization transmission power Ps, security evaluation coefficient ρ, jamming power xiWith the grade t of working times, by edge service The working time t of devicesK part is averagely divided into, is denoted as a time slot
S2. k-th of time slot is calculatedThe correlative of working condition;
S3. friendly jammer is learnt using Q learning algorithms, in each time slotAccording to system mode S(k)It makes a policy, selects phase The action x answeredi (k)
S4. after Edge Server completes Q learning trainings, friendly jammer is according to current state S in Q value tables(k)Corresponding equation tune Degree actsSend friendly interference signal.
2. the wireless communication anti-eavesdrop jamming power control algolithm according to claim 1 based on Q study, feature exist In the S1 steps include:
S101. by transmission power PsN grades are averagely divided into, note transmission power integrates as L, enables L=[P1,P2,…,Pn];
S102. determine that legitimate sender cooperates with security evaluation coefficient ρ, the ρ ∈ [0,1] made with recipient;
S103. by legitimate sender transmission power Ps, security evaluation coefficient ρ merge to obtain state set, be denoted as S, S=[Ps, ρ];
S104. the jamming power of friendly jammer being averagely divided into n grades, the jamming power behavior aggregate for remembering friendly jammer is A, Enable A=[x1,x2,…,xn];
S105. by the working time t of Edge ServersK part is averagely divided into, is denoted as a time slot
3. the wireless communication anti-eavesdrop jamming power control algolithm according to claim 2 based on Q study, feature exist In the S2 steps include:
S201. it is λ to determine channel fading coefficient, λ ∈ [0,1], measures legitimate sender to the distance d of recipientsr, legal transmission Person is to the distance d of listener-inse, friendly jammer to listener-in distance be dje
It calculates listener-in and eavesdrops information obtained by channel:
S202. information obtained by legitimate receiver is calculated:Wherein θ ∈ [0,1] are in encryption technology Under help, legal recipient is to the immunity programm of interference;
S203. metrical information secrecy capacity is calculated
C(Ps (k),xi (k))=log (γr(Ps (k),xi (k)))-log(γe(Ps (k),xi (k)))
S204. computational security information content I (S(k),xi (k)):
I(S(k),xi (k))=ρ(k)C(Ps (k),xi (k))
S205. measuring system energy loss E is calculateds(xi (k)):
Es(xi (k))=xi (k)Ei+xi (k)Ev+ηEn
Wherein, EiTo measure friendly jammer rate of Energy Loss, EvEnergy loss, E are calculated for Edge ServernFor conventional letter Breath transmission energy loss, note η be regular coefficients, η ∈ [0,1];
S206. the secrecy capacity and energy loss, calculating wireless communication anti-eavesdrop jamming power obtained according to above-mentioned measurement controls The immediate effect function of algorithm:
U(S(k), xi (k))=I (S(k), xi (k))-Es(xi (k))。
4. the wireless communication anti-eavesdrop jamming power control algolithm according to claim 3 based on Q study, feature exist In the S3 steps specifically include:
S301. the state set and jammer interference power behavior aggregate formed according to the transmission power of legitimate sender initializes Q squares Battle array;Order matrix V=mn, m >=0, n >=0, and list Q value tables;The learning rate of default Q study and the attenuation system of following attention degree Number be respectively α ∈ (0,1], δ ∈ (0,1], adjust α, δ to suitable value;
S302. the transmission power P of k-th of time slot legitimate sender is measureds (k), security evaluation coefficient ρ(k), obtain state value S(k); Inquire S in Q value tables(k)Corresponding optimal jamming powerOptimal scheduling probability is remembered for (1- ε), ε ∈ (0,1];It is selected by strategy Transfer action at this time is selected, adjusts ε to appropriate value;
S303. work as k=1, at the beginning gapDue to can not measuring state S1One jamming power action of random selectionWhen k >= 2, it is S to measure measuring state in k time slots(k), friendly jammer interference power isEdge Server passes through S206 steps at this time Formula calculate this training obtain immediate effect U (S(k),xi (k));
S304. at the end of time slot k, the transmission power P of (k+1) a time slot sender is measured according to step S101 to S104s (k +1)With security evaluation coefficient ρ(k+1), so that it is determined that the state value S of next time slot(k+1)
S305. friendly jammer is updated in state S(k)Under takeThe Q equations of action and pass through optimal actionObtained V side Journey;Edge Server is according to formula:
S306. step S302 to step S305 is repeated, until obtaining a convergent ideal Q value table.
CN201711475264.2A 2017-12-29 2017-12-29 Wireless communication anti-eavesdrop interference power control method based on Q learning Expired - Fee Related CN108235423B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711475264.2A CN108235423B (en) 2017-12-29 2017-12-29 Wireless communication anti-eavesdrop interference power control method based on Q learning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711475264.2A CN108235423B (en) 2017-12-29 2017-12-29 Wireless communication anti-eavesdrop interference power control method based on Q learning

Publications (2)

Publication Number Publication Date
CN108235423A true CN108235423A (en) 2018-06-29
CN108235423B CN108235423B (en) 2021-01-22

Family

ID=62646124

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711475264.2A Expired - Fee Related CN108235423B (en) 2017-12-29 2017-12-29 Wireless communication anti-eavesdrop interference power control method based on Q learning

Country Status (1)

Country Link
CN (1) CN108235423B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108923828A (en) * 2018-07-06 2018-11-30 西北工业大学 A kind of emitting antenna selecting method of the MIMO tapping channel based on deeply study
CN109274456A (en) * 2018-09-10 2019-01-25 电子科技大学 A kind of imperfect information intelligence anti-interference method based on intensified learning
CN110662238A (en) * 2019-10-24 2020-01-07 南京大学 Reinforced learning scheduling method and device for burst request under edge network
CN112087749A (en) * 2020-08-27 2020-12-15 华北电力大学(保定) Cooperative active eavesdropping method for realizing multiple listeners based on reinforcement learning
CN112260796A (en) * 2020-10-21 2021-01-22 三维通信股份有限公司 Method and device for controlling interference signal emission
CN113038567A (en) * 2021-01-20 2021-06-25 中国人民解放军陆军工程大学 Anti-interference model and anti-interference method in multi-relay communication
CN113452470A (en) * 2021-05-06 2021-09-28 浙江工业大学 Signal power optimization method of wireless energy supply communication network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104994569A (en) * 2015-06-25 2015-10-21 厦门大学 Multi-user reinforcement learning-based cognitive wireless network anti-hostile interference method
US9322907B1 (en) * 2012-08-07 2016-04-26 Rockwell Collins, Inc. Behavior based friend foe neutral determination method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9322907B1 (en) * 2012-08-07 2016-04-26 Rockwell Collins, Inc. Behavior based friend foe neutral determination method
CN104994569A (en) * 2015-06-25 2015-10-21 厦门大学 Multi-user reinforcement learning-based cognitive wireless network anti-hostile interference method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
DANIEL S. BERGER等: "Friendly Jamming on Access Points: Analysis and Real-World Measurements", 《IEEE》 *
LI WANG等: "Joint Optimization for Energy Consumption and Secrecy Capacity in Wireless Cooperative Networks", 《IEEE》 *
YING WANG等: "Distributed coalitional game for friendly jammer selection in ultra-dense networks", 《EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108923828A (en) * 2018-07-06 2018-11-30 西北工业大学 A kind of emitting antenna selecting method of the MIMO tapping channel based on deeply study
CN108923828B (en) * 2018-07-06 2019-06-07 西北工业大学 A kind of emitting antenna selecting method of the MIMO tapping channel based on deeply study
CN109274456A (en) * 2018-09-10 2019-01-25 电子科技大学 A kind of imperfect information intelligence anti-interference method based on intensified learning
CN110662238A (en) * 2019-10-24 2020-01-07 南京大学 Reinforced learning scheduling method and device for burst request under edge network
CN110662238B (en) * 2019-10-24 2020-08-25 南京大学 Reinforced learning scheduling method and device for burst request under edge network
CN112087749A (en) * 2020-08-27 2020-12-15 华北电力大学(保定) Cooperative active eavesdropping method for realizing multiple listeners based on reinforcement learning
CN112087749B (en) * 2020-08-27 2023-06-02 华北电力大学(保定) Cooperative active eavesdropping method for realizing multiple listeners based on reinforcement learning
CN112260796A (en) * 2020-10-21 2021-01-22 三维通信股份有限公司 Method and device for controlling interference signal emission
CN113038567A (en) * 2021-01-20 2021-06-25 中国人民解放军陆军工程大学 Anti-interference model and anti-interference method in multi-relay communication
CN113452470A (en) * 2021-05-06 2021-09-28 浙江工业大学 Signal power optimization method of wireless energy supply communication network
CN113452470B (en) * 2021-05-06 2022-06-17 浙江工业大学 Signal power optimization method of wireless energy supply communication network

Also Published As

Publication number Publication date
CN108235423B (en) 2021-01-22

Similar Documents

Publication Publication Date Title
CN108235423A (en) Wireless communication anti-eavesdrop jamming power control algolithm based on Q study
Li et al. Cognitive AmBC-NOMA IoV-MTS networks with IQI: Reliability and security analysis
He et al. Secure social networks in 5G systems with mobile edge computing, caching, and device-to-device communications
Xiao et al. User-centric view of jamming games in cognitive radio networks
Xiao et al. Game theoretic study on channel-based authentication in MIMO systems
Xiao et al. PHY-layer spoofing detection with reinforcement learning in wireless networks
Sagduyu et al. MAC games for distributed wireless network security with incomplete information of selfish and malicious user types
Koda et al. Differentially private aircomp federated learning with power adaptation harnessing receiver noise
Tang et al. Distributed consensus-based security mechanisms in cognitive radio mobile ad hoc networks
Tang et al. Securing wireless transmission against reactive jamming: A Stackelberg game framework
Chorppath et al. Bayesian mechanisms and detection methods for wireless network with malicious users
Lee et al. Distributed network secrecy
Li et al. Game theoretic study of protecting MIMO transmissions against smart attacks
Xu et al. Towards a secure medium access control protocol for cluster-based underwater wireless sensor networks
Li et al. Believe yourself: A user-centric misbehavior detection scheme for secure collaborative spectrum sensing
Lin et al. A secure collaborative spectrum sensing strategy in cyber-physical systems
Xie et al. Physical-layer authentication in wirelessly powered communication networks
Kalogerias et al. Mobile jammers for secrecy rate maximization in cooperative networks
Li et al. Reinforcement learning-based intelligent reflecting surface assisted communications against smart attackers
Xiao et al. Channel-based authentication game in MIMO systems
Lin et al. Physical layer security enhancement in energy harvesting-based cognitive internet of things: A GAN-powered deep reinforcement learning approach
Sheng et al. Online primary user emulation attacks in cognitive radio networks using Thompson sampling
Huo et al. A learning-aided intermittent cooperative jamming scheme for nonslotted wireless transmission in an IoT system
Yu et al. The security of physical layer in cognitive radio networks
YANG et al. Detection method of physical-layer impersonation attack based on deep Q-network in edge computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210122

Termination date: 20211229