{"title":"基于q学习的无人机安全通信防恶意窃听方法","authors":"Jian Zhang","doi":"10.1109/ICCAE55086.2022.9762433","DOIUrl":null,"url":null,"abstract":"Due to the advantages such as excellent mobility, low-cost, on-demand deployment, unmanned aerial vehicles (UAVs) are expected to play a significant role in the future wireless communication systems. One of the necessary and urgent problems is the physical layer security of this wireless communication system. Specifically, under the open nature of the UAV wireless channels, how to convey confidential information reliably in a coexistence environment with eavesdroppers. In this paper, we investigate a Q-learning based security scheme to maximize the average secrecy rate (ASR) against intentional or unintentional eavesdropping. Simulation results show comparable disguising performances compared with the benchmark method.","PeriodicalId":294641,"journal":{"name":"2022 14th International Conference on Computer and Automation Engineering (ICCAE)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Q-learning based Method f or Secure UAV Communication against Malicious Eavesdropping\",\"authors\":\"Jian Zhang\",\"doi\":\"10.1109/ICCAE55086.2022.9762433\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the advantages such as excellent mobility, low-cost, on-demand deployment, unmanned aerial vehicles (UAVs) are expected to play a significant role in the future wireless communication systems. One of the necessary and urgent problems is the physical layer security of this wireless communication system. Specifically, under the open nature of the UAV wireless channels, how to convey confidential information reliably in a coexistence environment with eavesdroppers. In this paper, we investigate a Q-learning based security scheme to maximize the average secrecy rate (ASR) against intentional or unintentional eavesdropping. Simulation results show comparable disguising performances compared with the benchmark method.\",\"PeriodicalId\":294641,\"journal\":{\"name\":\"2022 14th International Conference on Computer and Automation Engineering (ICCAE)\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-03-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 14th International Conference on Computer and Automation Engineering (ICCAE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCAE55086.2022.9762433\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 14th International Conference on Computer and Automation Engineering (ICCAE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCAE55086.2022.9762433","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Q-learning based Method f or Secure UAV Communication against Malicious Eavesdropping
Due to the advantages such as excellent mobility, low-cost, on-demand deployment, unmanned aerial vehicles (UAVs) are expected to play a significant role in the future wireless communication systems. One of the necessary and urgent problems is the physical layer security of this wireless communication system. Specifically, under the open nature of the UAV wireless channels, how to convey confidential information reliably in a coexistence environment with eavesdroppers. In this paper, we investigate a Q-learning based security scheme to maximize the average secrecy rate (ASR) against intentional or unintentional eavesdropping. Simulation results show comparable disguising performances compared with the benchmark method.