• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于能量收集的认知无线电网络中物理层安全增强的深度强化学习。

Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks.

机构信息

College of Electrical Engineering and Automation, Fuzhou University, Fuzhou 350108, China.

College of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798, Singapore.

出版信息

Sensors (Basel). 2023 Jan 10;23(2):807. doi: 10.3390/s23020807.

DOI:10.3390/s23020807
PMID:36679601
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9861036/
Abstract

The paper studies the secrecy communication threatened by a single eavesdropper in Energy Harvesting (EH)-based cognitive radio networks, where both the Secure User (SU) and the jammer harvest, store, and utilize RF energy from the Primary Transmitter (PT). Our main goal is to optimize the time slots for energy harvesting and wireless communication for both the secure user as well as the jammer to maximize the long-term performance of secrecy communication. A multi-agent Deep Reinforcement Learning (DRL) method is proposed for solving the optimization of resource allocation and performance. Specifically, each sub-channel from the Secure Transmitter (ST) to the Secure Receiver (SR) link, along with the jammer to the eavesdropper link, is regarded as an agent, which is responsible for exploring optimal power allocation strategy while a time allocation network is established to obtain optimal EH time allocation strategy. Every agent dynamically interacts with the wireless communication environment. Simulation results demonstrate that the proposed DRL-based resource allocation method outperforms the existing schemes in terms of secrecy rate, convergence speed, and the average number of transition steps.

摘要

本文研究了能量收集(EH)认知无线电网络中单个窃听者对保密通信的威胁,其中安全用户(SU)和干扰器都从主发射机(PT)处收集、存储和利用射频能量。我们的主要目标是优化安全用户和干扰器的能量收集和无线通信时隙,以最大化保密通信的长期性能。提出了一种多智能体深度强化学习(DRL)方法来解决资源分配和性能优化问题。具体来说,将从安全发送器(ST)到安全接收器(SR)链路的每个子信道以及干扰器到窃听者链路都视为一个智能体,负责探索最优的功率分配策略,同时建立时间分配网络以获得最优的 EH 时间分配策略。每个智能体都与无线通信环境动态交互。仿真结果表明,所提出的基于 DRL 的资源分配方法在保密率、收敛速度和平均转换步骤数方面优于现有方案。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/6c0372b3505c/sensors-23-00807-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/42ac3b8893dc/sensors-23-00807-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/cbcf75f63d21/sensors-23-00807-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/94a83165362e/sensors-23-00807-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/0986c2e9fa73/sensors-23-00807-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/c6b8085c2dbb/sensors-23-00807-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/ab13c2be196e/sensors-23-00807-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/3f8a53820ebc/sensors-23-00807-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/f5e4ed48edbe/sensors-23-00807-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/709e3ddcbfd5/sensors-23-00807-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/411699808797/sensors-23-00807-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/458915595de4/sensors-23-00807-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/6c0372b3505c/sensors-23-00807-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/42ac3b8893dc/sensors-23-00807-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/cbcf75f63d21/sensors-23-00807-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/94a83165362e/sensors-23-00807-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/0986c2e9fa73/sensors-23-00807-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/c6b8085c2dbb/sensors-23-00807-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/ab13c2be196e/sensors-23-00807-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/3f8a53820ebc/sensors-23-00807-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/f5e4ed48edbe/sensors-23-00807-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/709e3ddcbfd5/sensors-23-00807-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/411699808797/sensors-23-00807-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/458915595de4/sensors-23-00807-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/0fbf/9861036/6c0372b3505c/sensors-23-00807-g012.jpg

相似文献

1
Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks.基于能量收集的认知无线电网络中物理层安全增强的深度强化学习。
Sensors (Basel). 2023 Jan 10;23(2):807. doi: 10.3390/s23020807.
2
Secrecy Performance Maximization for Underlay CR Networks with an Energy Harvesting Jammer.具有能量收集干扰器的覆盖式认知无线电网络的保密性能最大化。
Sensors (Basel). 2021 Dec 8;21(24):8198. doi: 10.3390/s21248198.
3
Optimal resource allocation method for energy harvesting based underlay Cognitive Radio networks.基于能量收集的认知无线电网络的最优资源分配方法。
PLoS One. 2023 Jan 5;18(1):e0279886. doi: 10.1371/journal.pone.0279886. eCollection 2023.
4
Resource Allocation for a Secure SWIPT Network Based on a Quantitative Energy Harvesting Mechanism.基于定量能量收集机制的安全 SWIPT 网络资源分配。
Sensors (Basel). 2023 May 27;23(11):5117. doi: 10.3390/s23115117.
5
Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer.具有不完美信道状态信息和友好干扰器的双向同时无线信息与能量传输中继网络中的物理层安全
Entropy (Basel). 2023 Jan 6;25(1):122. doi: 10.3390/e25010122.
6
Power Allocation and Energy Cooperation for UAV-Enabled MmWave Networks: A Multi-Agent Deep Reinforcement Learning Approach.无人机增强毫米波网络的功率分配和能量合作:一种多智能体深度强化学习方法。
Sensors (Basel). 2021 Dec 30;22(1):270. doi: 10.3390/s22010270.
7
Secure Communication in Cooperative SWIPT NOMA Systems with Non-Linear Energy Harvesting and Friendly Jamming.协作 SWIPT NOMA 系统中非线性能量收集和友好干扰下的安全通信。
Sensors (Basel). 2020 Feb 14;20(4):1047. doi: 10.3390/s20041047.
8
Deep Reinforcement Learning Based Resource Allocation for D2D Communications Underlay Cellular Networks.基于深度强化学习的蜂窝网络中 D2D 通信的资源分配。
Sensors (Basel). 2022 Dec 3;22(23):9459. doi: 10.3390/s22239459.
9
Low-Complexity Transmit Power Control for Secure Communications in Wireless-Powered Cognitive Radio Networks.无线供电认知无线电网络中用于安全通信的低复杂度发射功率控制
Sensors (Basel). 2021 Nov 25;21(23):7837. doi: 10.3390/s21237837.
10
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay.具有无线能量收集不可信中继的CIoT网络中的安全通信
Sensors (Basel). 2017 Sep 4;17(9):2023. doi: 10.3390/s17092023.

引用本文的文献

1
Secure channel estimation model for cognitive radio network physical layer security using two-level shared key authentication.基于两级共享密钥认证的认知无线电网络物理层安全的安全信道估计模型
Sci Rep. 2025 Jan 19;15(1):2445. doi: 10.1038/s41598-025-86165-x.
2
Machine-Learning-Assisted Cyclostationary Spectral Analysis for Joint Signal Classification and Jammer Detection at the Physical Layer of Cognitive Radio.认知无线电物理层联合信号分类与干扰检测的机器学习辅助循环平稳频谱分析
Sensors (Basel). 2023 Aug 12;23(16):7144. doi: 10.3390/s23167144.