MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) 2019
DOI: 10.1109/milcom47813.2019.9020985
|View full text |Cite
|
Sign up to set email alerts
|

QoS and Jamming-Aware Wireless Networking Using Deep Reinforcement Learning

Abstract: The problem of quality of service (QoS) and jammingaware communications is considered in an adversarial wireless network subject to external eavesdropping and jamming attacks. To ensure robust communication against jamming, an interferenceaware routing protocol is developed that allows nodes to avoid communication holes created by jamming attacks. Then, a distributed cooperation framework, based on deep reinforcement learning, is proposed that allows nodes to assess network conditions and make deep learning-dr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
23
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 37 publications
(23 citation statements)
references
References 13 publications
0
23
0
Order By: Relevance
“…Later, Abuzainab et al [1] proposed an interference-aware routing protocol to ensure robust communication against jamming. This protocol has the purpose of allowing nodes to avoid communication holes created by jamming attacks.…”
Section: Jamming Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…Later, Abuzainab et al [1] proposed an interference-aware routing protocol to ensure robust communication against jamming. This protocol has the purpose of allowing nodes to avoid communication holes created by jamming attacks.…”
Section: Jamming Attackmentioning
confidence: 99%
“…In the field of internet of things (IoT), [35] discuss the challenge of using ML-based techniques, including RL, to protect user privacy (e.g., against eavesdropping attacks [7]). In this regard, the cooperation framework previously explained in [1] also aims to make decisions on eavesdropping attacks using a dedicated deep RL approach. In another area, to protect wireless networks, Xie and Xiao [36] apply prospect theory (theory based on the observation that people react differently to potential losses and potential gains -wikipedia) to formulate the interaction between a smart attacker and a mobile user.…”
Section: Eavesdropping Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…A novel channel access strategy to cope with channel jamming based on Q learning has been proposed in [22]. Literature [23] designed an interference-aware routing protocol and proposed a cooperation framework based on reinforcement learning to defend the network against jamming attacks. Since traditional Q learning is inefficient and hard to converge when the state space or action space is large, deep neural networks are adopted by reinforcement learning to achieve deep reinforcement learning which can take the spectrum waterfall as input and outputs channel selection actions [12].…”
Section: Related Workmentioning
confidence: 99%
“…Deep learning finds rich application in wireless communications. Examples include spectrum sensing [10], MIMO detection [11], channel estimation and signal detection [12], physical layer communications [13], jammer detection [14], stealth jamming [15], [16], power control [17], signal spoofing [18], and transmitter-receiver scheduling [19]. RF signal classification can support different applications such as radio fingerprinting [28] that can be ultimately used in cognitive radio systems [29] subject to dynamic and unknown interference and jamming effects [30].…”
Section: Related Workmentioning
confidence: 99%