Linear Jamming Bandits: Sample-Efficient Learning for Non-Coherent Digital Jamming

被引:2
作者
Thornton, Charles E. [1 ]
Buehrer, R. Michael [1 ]
机构
[1] Wireless Virginia Tech, Bradley Dept ECE, Blacksburg, VA 24061 USA
来源
2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM) | 2022年
关键词
Jamming; online learning; linear bandit; statistical learning theory;
D O I
10.1109/MILCOM55135.2022.10017637
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It has been shown (Amuru et al. 2015) that online learning algorithms can be effectively used to select optimal physical layer parameters for jamming against digital modulation schemes without a priori knowledge of the victim's transmission strategy. However, this learning problem involves solving a multi-armed bandit problem with a mixed action space that can grow very large. As a result, convergence to the optimal jamming strategy can be slow, especially when the victim and jammer's symbols are not perfectly synchronized. In this work, we remedy the sample efficiency issues by introducing a linear bandit algorithm that accounts for inherent similarities between actions. Further, we propose context features which are wellsuited for the statistical features of the non-coherent jamming problem and demonstrate significantly improved convergence behavior compared to the prior art. Additionally, we show how prior knowledge about the victim's transmissions can be seamlessly integrated into the learning framework. We finally discuss limitations in the asymptotic regime.
引用
收藏
页数:6
相关论文
共 11 条
  • [1] Abeille M, 2017, PR MACH LEARN RES, V54, P176
  • [2] Agrawal S., 2013, PMLR, P127
  • [3] Jamming Bandits-A Novel Learning Method for Optimal Jamming
    Amuru, SaiDhiraj
    Tekin, Cem
    van der Schaar, Mihaela
    Buehrer, R. Michael
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (04) : 2792 - 2808
  • [4] Optimal Jamming Against Digital Modulation
    Amuru, SaiDhiraj
    Buehrer, R. Michael
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) : 2212 - 2224
  • [5] Arumugam D., 2021, P 38 TH INT C MACHIN, P373
  • [6] THE GAUSSIAN TEST CHANNEL WITH AN INTELLIGENT JAMMER
    BASAR, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (01) : 152 - 157
  • [7] Lattimore T, 2020, BANDIT ALGORITHMS, P1, DOI 10.1017/9781108571401
  • [8] Lichtman M, 2018, IEEE INT CONF COMM
  • [9] A Communications Jamming Taxonomy
    Lichtman, Marc
    Poston, Jeffrey D.
    Amuru, SaiDhiraj
    Shahriar, Chowdhury
    Clancy, T. Charles
    Buehrer, R. Michael
    Reed, Jeffrey H.
    [J]. IEEE SECURITY & PRIVACY, 2016, 14 (01) : 47 - 54
  • [10] McEliece R.J., 1981, Proceedings of IEEE International Conference on Communication, P45