Covert UAV Data Transmission Via Semantic Communication: A DRL-Driven Joint Position and Power Optimization Method

被引:0
作者
Xu, Rui [1 ]
Li, Gaolei [1 ]
Yang, Zhaohui [2 ]
Kang, Jiawen [3 ]
Zhang, Xiaoyu [4 ]
Li, Jianhua [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai, Peoples R China
[2] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou, Peoples R China
[3] Guangdong Univ Technol, Sch Automat, Guangzhou, Peoples R China
[4] Shenyang Univ Technol, Sch Artificial Intelligence, Shenyang, Peoples R China
来源
2024 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA, ICCC | 2024年
关键词
Unnamed Aerial Vehicle; Semantic Communication; Covert Communication; Deep Reinforcement Learning;
D O I
10.1109/ICCC62479.2024.10681776
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The integration of covert unnamed aerial vehicle (UAV) data transmission and semantic communication has recently shown great potential to improve efficiency and reliability of data transmission. However, due to the variability of the complex communication environment, existing researches are difficult to provide reliable optimization method for UAV under adversarial eavesdropping scenarios. In this paper, we propose a covert UAV data transmission via semantic communication (CUDT-SC) framework, leveraging a full-duplex (FD) UAV to effectively obscure the entire transmission process from eaves-droppers. Furthermore, a newly-defined metric, namely semantic UAV data throughput (SUDT), is introduced to quantify the system's performance. Building on this foundation, we propose a deep reinforcement learning driven joint position and power optimization (DRL-JPPO) algorithm to maximize the accumulated SUDT during the UAV data transmission period. Extensive experiments demonstrate the effectiveness of CUDT-SC framework. Specifically, the designated DRL-JPPO algorithm not only attains a significantly higher accumulative SUDT of up to 40%, but also demonstrates rapid convergence when compared to the benchmark schemes.
引用
收藏
页数:6
相关论文
共 19 条
  • [1] An Autonomous Transmission Scheme Using Dueling DQN for D2D Communication Networks
    Ban, Tae-Won
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (12) : 16348 - 16352
  • [2] Modeling effective cybersecurity training frameworks: A delphi method-based study
    Chowdhury, Nabin
    Katsikas, Sokratis
    Gkioulos, Vasileios
    [J]. COMPUTERS & SECURITY, 2022, 113
  • [3] Rethinking Wireless Communication Security in Semantic Internet of Things
    Du, Hongyang
    Wang, Jiacheng
    Niyato, Dusit
    Kang, Jiawen
    Xiong, Zehui
    Guizani, Mohsen
    Kim, Dong In
    [J]. IEEE WIRELESS COMMUNICATIONS, 2023, 30 (03) : 36 - 43
  • [4] Performance Analysis and Optimization for Jammer-Aided Multiantenna UAV Covert Communication
    Du, Hongyang
    Niyato, Dusit
    Xie, Yuan-Ai
    Cheng, Yanyu
    Kang, Jiawen
    Kim, Dong In
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2022, 40 (10) : 2962 - 2979
  • [5] Device-Edge Digital Semantic Communication with Trained Non-Linear Quantization
    Guo, Lei
    Chen, Wei
    Sun, Yuxuan
    Ai, Bo
    [J]. 2023 IEEE 97TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-SPRING, 2023,
  • [6] Guo Zewei, 2022, 2022 International Conference on Networking and Network Applications (NaNA), P35, DOI 10.1109/NaNA56854.2022.00014
  • [7] Deep Reinforcement Learning Enabled Covert Transmission With UAV
    Hu, Jinsong
    Guo, Mingqian
    Yan, Shihao
    Chen, Youjia
    Zhou, Xiaobo
    Chen, Zhizhang
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2023, 12 (05) : 917 - 921
  • [8] Robust Semantic Communications With Masked VQ-VAE Enabled Codebook
    Hu, Qiyu
    Zhang, Guangyi
    Qin, Zhijin
    Cai, Yunlong
    Yu, Guanding
    Li, Geoffrey Ye
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (12) : 8707 - 8722
  • [9] Privacy-Preserving Few-Shot Traffic Detection Against Advanced Persistent Threats via Federated Meta Learning
    Hu, Yilun
    Wu, Jun
    Li, Gaolei
    Li, Jianhua
    Cheng, Jinke
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (03): : 2549 - 2560
  • [10] Resource Allocation and Trajectory Optimization for UAV-Enabled Multi-User Covert Communications
    Jiang, Xu
    Yang, Zhutian
    Zhao, Nan
    Chen, Yunfei
    Ding, Zhiguo
    Wang, Xianbin
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (02) : 1989 - 1994