2022
DOI: 10.1109/access.2022.3158751
|View full text |Cite
|
Sign up to set email alerts
|

Anti-Jamming RIS Communications Using DQN-Based Algorithm

Abstract: Wireless sensor networks (WSNs) are widely applied in battlefield surveillance, where the data collection (e.g. target tracking or contention zone observation) employed by local sensor nodes needs to send to military bases for tactical decisions. Since data transmissions are susceptible to malicious attacks, jammers of adversaries can successfully block their victim's communications by transmitting interfering signals to legitimate transmissions. Nowadays, owing to the ability to reconfigure the wireless propa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 35 publications
(47 reference statements)
0
7
0
Order By: Relevance
“…In the simulations, the proposed Meta-PPO algorithm implemented its learning processes for 1000 episodes and 10 iterations for parameter updates in each episode. Figure 9 shows the curves of normalized network throughput changing with the episodes when the proposed Meta-PPO algorithm was used, which was compared with PPO [31], DQN [32], Double DQN [33], and Dueling DQN [34] algorithms. Normalized throughput is a widely accepted criterion for measuring the performance of an agent's strategy [35].…”
Section: Parametersmentioning
confidence: 99%
“…In the simulations, the proposed Meta-PPO algorithm implemented its learning processes for 1000 episodes and 10 iterations for parameter updates in each episode. Figure 9 shows the curves of normalized network throughput changing with the episodes when the proposed Meta-PPO algorithm was used, which was compared with PPO [31], DQN [32], Double DQN [33], and Dueling DQN [34] algorithms. Normalized throughput is a widely accepted criterion for measuring the performance of an agent's strategy [35].…”
Section: Parametersmentioning
confidence: 99%
“…As stated in Section 2, the imperfect CSI results in infinite non-convexity in both the objective function and constraints. With this as the focus, according to the works [28][29][30], the equivalent worst-case CSI of the illegitimate channel that can be obtained through utilizing the discretization method is given, respectively, by…”
Section: Robust Channel Processingmentioning
confidence: 99%
“…Store the experience transitions (s t , a t , r t , s t+1 ). Sample mini-batch transitions based on PER using (30), and then, update the priority of the selected transition based on its TD error.…”
mentioning
confidence: 99%
“…An anti-jamming method was proposed in [2], in which the transmitting beam and RIS phase shift were joint optimized. Furthermore, the performance of RIS-assisted wireless communication under the conditions of simultaneous jamming and eavesdropping attacks was studied in [5,6]. However, the above papers assume that the BS accurately knows about prior information such as jamming power or jamming channel, which often fail in practical situations.…”
Section: Introductionmentioning
confidence: 99%
“…However, the above papers assume that the BS accurately knows about prior information such as jamming power or jamming channel, which often fail in practical situations. In [5,7], the optimization and regulation methods of RIS parameters were studied under the conditions of jamming perception error and uncertainty in the direction of jamming. In [8], the impact of the correlation between interference and communication signals on the performance of communication systems was studied.…”
Section: Introductionmentioning
confidence: 99%