Anti-Intelligent UAV Jamming Strategy via Deep Q-Networks

被引:86
作者
Gao, Ning [1 ]
Qin, Zhijin [2 ]
Jing, Xiaojun [3 ]
Ni, Qiang [4 ]
Jin, Shi [1 ]
机构
[1] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
[2] Queen Mary Univ London, Sch Elect Engn & Comp Sci, London E1 4NS, England
[3] Beijing Univ Posts & Telecommun, Sch Informat & Commun Engn, Beijing 100876, Peoples R China
[4] Univ Lancaster, Sch Comp & Commun, Lancaster LA1 4WA, England
基金
中国国家自然科学基金;
关键词
Jamming; Base stations; Trajectory; Games; Unmanned aerial vehicles; Space stations; Security; UAV; jamming; Markov decision process; deep Q-networks; TRAJECTORY DESIGN; STACKELBERG GAME; COMMUNICATION; TRANSMISSION; SECURITY; CONNECTIVITY;
D O I
10.1109/TCOMM.2019.2947918
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The downlink communications are vulnerable to intelligent unmanned aerial vehicle (UAV) jamming attack. In this paper, we propose a novel anti-intelligent UAV jamming strategy, in which the ground users can learn the optimal trajectory to elude such jamming. The problem is formulated as a stackelberg dynamic game, where the UAV jammer acts as a leader and the ground users act as followers. First, as the UAV jammer is only aware of the incomplete channel state information (CSI) of the ground users, for the first attempt, we model such leader sub-game as a partially observable Markov decision process (POMDP). Then, we obtain the optimal jamming trajectory via the developed deep recurrent Q-networks (DRQN) in the three-dimension space. Next, for the followers sub-game, we use the Markov decision process (MDP) to model it. Then we obtain the optimal communication trajectory via the developed deep Q-networks (DQN) in the two-dimension space. We prove the existence of the stackelberg equilibrium and derive the closed-form expression for the stackelberg equilibrium in a special case. Moreover, some insightful remarks are obtained and the time complexity of the proposed defense strategy is analyzed. The simulations show that the proposed defense strategy outperforms the benchmark strategies.
引用
收藏
页码:569 / 581
页数:13
相关论文
共 39 条
  • [1] Al-Hourani A, 2014, IEEE GLOB COMM CONF, P2898, DOI 10.1109/GLOCOM.2014.7037248
  • [2] Optimal LAP Altitude for Maximum Coverage
    Al-Hourani, Akram
    Kandeepan, Sithamparanathan
    Lardner, Simon
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2014, 3 (06) : 569 - 572
  • [3] Jamming in Wireless Networks Under Uncertainty
    Altman, Eitan
    Avrachenkov, Konstantin
    Garnaev, Andrey
    [J]. MOBILE NETWORKS & APPLICATIONS, 2011, 16 (02) : 246 - 254
  • [4] [Anonymous], [No title captured]
  • [5] Bhattacharya S, 2010, P AMER CONTR CONF, P818
  • [6] Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling
    Cai, Yunlong
    Cui, Fangyu
    Shi, Qingjiang
    Zhao, Minjian
    Li, Geoffrey Ye
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (09) : 1972 - 1985
  • [7] MACHINE LEARNING FOR WIRELESS CONNECTIVITY AND SECURITY OF CELLULAR-CONNECTED UAVS
    Challita, Ursula
    Ferdowsi, Aidin
    Chen, Mingzhe
    Saad, Walid
    [J]. IEEE WIRELESS COMMUNICATIONS, 2019, 26 (01) : 28 - 35
  • [8] Feng QX, 2006, IEEE VTS VEH TECHNOL, P2901
  • [9] ComNet: Combination of Deep Learning and Expert Knowledge in OFDM Receivers
    Gao, Xuanxuan
    Jin, Shi
    Wen, Chao-Kai
    Li, Geoffrey Ye
    [J]. IEEE COMMUNICATIONS LETTERS, 2018, 22 (12) : 2627 - 2630
  • [10] Han Zhu, 2012, GAME THEORY WIRELESS