无人机- ris认知系统隐蔽通信中深度学习驱动的吞吐量最大化

IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC
Van Nhan Vo;Nguyen Quoc Long;Viet-Hung Dang;Tu Dac Ho;Hung Tran;Symeon Chatzinotas;Dinh-Hieu Tran;Surasak Sanguanpong;Chakchai So-In
{"title":"无人机- ris认知系统隐蔽通信中深度学习驱动的吞吐量最大化","authors":"Van Nhan Vo;Nguyen Quoc Long;Viet-Hung Dang;Tu Dac Ho;Hung Tran;Symeon Chatzinotas;Dinh-Hieu Tran;Surasak Sanguanpong;Chakchai So-In","doi":"10.1109/OJCOMS.2025.3565764","DOIUrl":null,"url":null,"abstract":"This paper examines a cognitive radio (CR) nonorthogonal multiple access (NOMA) system in which an unmanned aerial vehicle equipped with a reconfigurable intelligent surface (UAV-RIS) plays two roles: relaying and friendly jamming. The communication protocol has two phases. The first is an energy harvesting phase in which the UAV harvests radio frequency energy from a power beacon. In the second phase, a secondary transmitter (ST) simultaneously sends superimposed signals to secondary receivers (SRs) (a public SR and a covert SR) via NOMA with the assistance of the UAV-RIS. Then, a UAV warden and a UAV jammer launch a cooperative attack, in which the first adversary wiretaps the signals from the ST and UAV-RIS, whereas the second interferes with the SRs to force the ST to increase its transmit power. For improved secrecy, the UAV-RIS uses its harvested energy to combat the UAV warden. For this system, the secrecy performance is evaluated on the basis of the concept of covert communication. In particular, optimization algorithms are employed to maximize the covert SR throughput under outage probability and security constraints. A deep neural network model is subsequently trained to discover the relationships between the environmental parameters and optimized parameters to enable rapid adaptation to environmental conditions.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"4140-4155"},"PeriodicalIF":6.3000,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10980338","citationCount":"0","resultStr":"{\"title\":\"Deep Learning-Driven Throughput Maximization in Covert Communication for UAV-RIS Cognitive Systems\",\"authors\":\"Van Nhan Vo;Nguyen Quoc Long;Viet-Hung Dang;Tu Dac Ho;Hung Tran;Symeon Chatzinotas;Dinh-Hieu Tran;Surasak Sanguanpong;Chakchai So-In\",\"doi\":\"10.1109/OJCOMS.2025.3565764\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper examines a cognitive radio (CR) nonorthogonal multiple access (NOMA) system in which an unmanned aerial vehicle equipped with a reconfigurable intelligent surface (UAV-RIS) plays two roles: relaying and friendly jamming. The communication protocol has two phases. The first is an energy harvesting phase in which the UAV harvests radio frequency energy from a power beacon. In the second phase, a secondary transmitter (ST) simultaneously sends superimposed signals to secondary receivers (SRs) (a public SR and a covert SR) via NOMA with the assistance of the UAV-RIS. Then, a UAV warden and a UAV jammer launch a cooperative attack, in which the first adversary wiretaps the signals from the ST and UAV-RIS, whereas the second interferes with the SRs to force the ST to increase its transmit power. For improved secrecy, the UAV-RIS uses its harvested energy to combat the UAV warden. For this system, the secrecy performance is evaluated on the basis of the concept of covert communication. In particular, optimization algorithms are employed to maximize the covert SR throughput under outage probability and security constraints. A deep neural network model is subsequently trained to discover the relationships between the environmental parameters and optimized parameters to enable rapid adaptation to environmental conditions.\",\"PeriodicalId\":33803,\"journal\":{\"name\":\"IEEE Open Journal of the Communications Society\",\"volume\":\"6 \",\"pages\":\"4140-4155\"},\"PeriodicalIF\":6.3000,\"publicationDate\":\"2025-04-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10980338\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Open Journal of the Communications Society\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10980338/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of the Communications Society","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10980338/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

摘要

本文研究了一种认知无线电(CR)非正交多址(NOMA)系统,在该系统中,配备可重构智能表面(UAV-RIS)的无人机扮演中继和友好干扰两个角色。通信协议有两个阶段。第一个是能量收集阶段,其中无人机从电力信标收集射频能量。在第二阶段,辅助发射器(ST)在UAV-RIS的协助下,通过NOMA同时向辅助接收器(SRs)(一个公开SR和一个隐蔽SR)发送叠加信号。然后,一名无人机管理员和一名无人机干扰者发起合作攻击,其中第一个对手窃听ST和无人机- ris的信号,而第二个对手干扰sr以迫使ST增加其发射功率。为了提高保密性,UAV- ris利用其收集的能量来对抗UAV守卫者。基于隐蔽通信的概念,对该系统的保密性能进行了评价。特别是,在中断概率和安全约束下,采用优化算法最大化隐蔽SR吞吐量。随后训练深度神经网络模型来发现环境参数和优化参数之间的关系,以实现对环境条件的快速适应。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Deep Learning-Driven Throughput Maximization in Covert Communication for UAV-RIS Cognitive Systems
This paper examines a cognitive radio (CR) nonorthogonal multiple access (NOMA) system in which an unmanned aerial vehicle equipped with a reconfigurable intelligent surface (UAV-RIS) plays two roles: relaying and friendly jamming. The communication protocol has two phases. The first is an energy harvesting phase in which the UAV harvests radio frequency energy from a power beacon. In the second phase, a secondary transmitter (ST) simultaneously sends superimposed signals to secondary receivers (SRs) (a public SR and a covert SR) via NOMA with the assistance of the UAV-RIS. Then, a UAV warden and a UAV jammer launch a cooperative attack, in which the first adversary wiretaps the signals from the ST and UAV-RIS, whereas the second interferes with the SRs to force the ST to increase its transmit power. For improved secrecy, the UAV-RIS uses its harvested energy to combat the UAV warden. For this system, the secrecy performance is evaluated on the basis of the concept of covert communication. In particular, optimization algorithms are employed to maximize the covert SR throughput under outage probability and security constraints. A deep neural network model is subsequently trained to discover the relationships between the environmental parameters and optimized parameters to enable rapid adaptation to environmental conditions.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
13.70
自引率
3.80%
发文量
94
审稿时长
10 weeks
期刊介绍: The IEEE Open Journal of the Communications Society (OJ-COMS) is an open access, all-electronic journal that publishes original high-quality manuscripts on advances in the state of the art of telecommunications systems and networks. The papers in IEEE OJ-COMS are included in Scopus. Submissions reporting new theoretical findings (including novel methods, concepts, and studies) and practical contributions (including experiments and development of prototypes) are welcome. Additionally, survey and tutorial articles are considered. The IEEE OJCOMS received its debut impact factor of 7.9 according to the Journal Citation Reports (JCR) 2023. The IEEE Open Journal of the Communications Society covers science, technology, applications and standards for information organization, collection and transfer using electronic, optical and wireless channels and networks. Some specific areas covered include: Systems and network architecture, control and management Protocols, software, and middleware Quality of service, reliability, and security Modulation, detection, coding, and signaling Switching and routing Mobile and portable communications Terminals and other end-user devices Networks for content distribution and distributed computing Communications-based distributed resources control.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信