{"title":"利用用户选择算法保护无线通信网络","authors":"Xiaoying Qiu, Guangda Li, Xuan Sun, Zhiguo Du","doi":"10.1109/TrustCom50675.2020.00213","DOIUrl":null,"url":null,"abstract":"How to improve the security and stability of wireless communication systems has become a critical issue. In this paper, physical layer security is introduced to overcome security challenges. The considered communication system is equipped with full-duplex (FD) users in contrast to conventional frameworks where half-duplex (HD) users are at hand. Under these assumptions, we propose a Q-learning based user selection algorithm to model the interaction between a source and multiple users. We also investigate the effect of self-interference and channel interference on physical layer security. The numerical results verify the superiority of the proposed algorithm and in certain conditions, demonstrate substantial performance gain over the conventional approaches.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Exploiting User Selection Algorithm for Securing Wireless Communication Networks\",\"authors\":\"Xiaoying Qiu, Guangda Li, Xuan Sun, Zhiguo Du\",\"doi\":\"10.1109/TrustCom50675.2020.00213\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"How to improve the security and stability of wireless communication systems has become a critical issue. In this paper, physical layer security is introduced to overcome security challenges. The considered communication system is equipped with full-duplex (FD) users in contrast to conventional frameworks where half-duplex (HD) users are at hand. Under these assumptions, we propose a Q-learning based user selection algorithm to model the interaction between a source and multiple users. We also investigate the effect of self-interference and channel interference on physical layer security. The numerical results verify the superiority of the proposed algorithm and in certain conditions, demonstrate substantial performance gain over the conventional approaches.\",\"PeriodicalId\":221956,\"journal\":{\"name\":\"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)\",\"volume\":\"51 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TrustCom50675.2020.00213\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TrustCom50675.2020.00213","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Exploiting User Selection Algorithm for Securing Wireless Communication Networks
How to improve the security and stability of wireless communication systems has become a critical issue. In this paper, physical layer security is introduced to overcome security challenges. The considered communication system is equipped with full-duplex (FD) users in contrast to conventional frameworks where half-duplex (HD) users are at hand. Under these assumptions, we propose a Q-learning based user selection algorithm to model the interaction between a source and multiple users. We also investigate the effect of self-interference and channel interference on physical layer security. The numerical results verify the superiority of the proposed algorithm and in certain conditions, demonstrate substantial performance gain over the conventional approaches.