Treffer: Deep Learning-Assisted Secure UAV-Relaying Networks With Channel Uncertainties.

Title:
Deep Learning-Assisted Secure UAV-Relaying Networks With Channel Uncertainties.
Authors:
Tang, Xiao1 tangxiao@nwpu.edu.cn, Liu, Na1 liuna@mail.nwpu.edu.cn, Zhang, Ruonan1 rzhang@nwpu.edu.cn, Han, Zhu2 hanzhu22@gmail.com
Source:
IEEE Transactions on Vehicular Technology. May2022, Vol. 71 Issue 5, p5048-5059. 12p.
Database:
Business Source Premier

Weitere Informationen

Unmanned aerial vehicles (UAVs) play a critical role for 5 G/B5G communications. In this paper, we investigate the physical layer security issue for ground transmissions with the help of a UAV. Specifically, we consider the scenario without direct transmissions and employ the UAV as a mobile relay to amplify and forward the confidential information. Meanwhile, the receiver transmits cooperative jamming attempting to disrupt eavesdropping. We investigate the UAV deployment and receiver jamming strategy jointly for the optimized secrecy rate, while considering the channel uncertainties. In particular, for the case of complete channel state information (CSI), the jamming power is obtained by bi-section search, and we propose a data-trained deep neural network (DNN) to approximate the optimal UAV deployment. Meanwhile, for the case with partial CSI, we design a deep Q network (DQN) to learn the optimal UAV deployment, due to the increased complexity to determine the jamming strategy with channel statistics. Simulation results demonstrate that both the learned DQN and trained DNN model effectively approximate the optimal deployment of the UAV. Moreover, compared with the baselines, our proposal significantly improves the security performance of legitimate transmissions. [ABSTRACT FROM AUTHOR]

Copyright of IEEE Transactions on Vehicular Technology is the property of IEEE and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)