• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:林瑞全

Refining:

Source

Submit Unfold

Co-

Submit Unfold

Language

Submit

Clean All

Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 12 >
Thwarting SSDF Attacks From High-Speed Movement VUs in the CIoV Network: Based on Blockchain and Stochastic Evolutionary Game SCIE
期刊论文 | 2025 , 12 (2) , 2233-2250 | IEEE INTERNET OF THINGS JOURNAL
Abstract&Keyword Cite Version(2)

Abstract :

Cognitive Internet of Vehicles (CIoV) adds the cognitive engine based on traditional Internet of Vehicles (IoV), which can improve spectrum utilization. However, spectrum sensing data falsification (SSDF) attacks pose a threat to CIoV network security. To ensure the full utilization of spectrum resources and protect primary users transmission, this article combines blockchain with CIoV to defend against SSDF attacks in the presence of vehicle users (VUs) entering and leaving the network. Specifically, this article introduces a virtual currency called Sencoins serve as credential for VUs to purchase transmission shares. And this article proposes a reward and punishment mechanism and a hybrid Proof-of-Stake (PoS) and Proof-of-Work (PoW) mining model to thwart the motivation of the VUs to launch SSDF attacks. On this basis, this article investigates the dynamics of SSDF attack strategy choice of VUs, and uses the largest Lyapunov exponent (LLE) to determine the critical value of Sencoins that avoids the system to exhibit chaotic behavior. To describe the uncertainty of the population proportion of VUs that choose different attack strategies due to high-speed movement and the VUs entering and leaving the CIoV network, this article introduces Gaussian white noise into the replication dynamics equation and builds the It & ocirc; stochastic evolutionary game model, and solves it according to the stability judgment theorem of stochastic differential equations and stochastic Taylor expansion. Finally, simulation results verify that the proposed method can quickly and effectively thwart SSDF attacks in the CIoV network. And compared with traditional methods, the proposed method can improve the efficiency of defending against SSDF attacks by 567% and the average throughput by 25%.

Keyword :

Blockchain Blockchain Blockchains Blockchains Cognitive Internet of Vehicles (CIoV) Cognitive Internet of Vehicles (CIoV) Data models Data models Games Games Interference Interference Internet of Vehicles Internet of Vehicles Security Security Sensors Sensors spectrum sensing data falsification (SSDF) attack spectrum sensing data falsification (SSDF) attack stochastic evolutionary game stochastic evolutionary game Stochastic processes Stochastic processes Throughput Throughput Wireless sensor networks Wireless sensor networks

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Li, Fushuai , Lin, Ruiquan , Chen, Wencheng et al. Thwarting SSDF Attacks From High-Speed Movement VUs in the CIoV Network: Based on Blockchain and Stochastic Evolutionary Game [J]. | IEEE INTERNET OF THINGS JOURNAL , 2025 , 12 (2) : 2233-2250 .
MLA Li, Fushuai et al. "Thwarting SSDF Attacks From High-Speed Movement VUs in the CIoV Network: Based on Blockchain and Stochastic Evolutionary Game" . | IEEE INTERNET OF THINGS JOURNAL 12 . 2 (2025) : 2233-2250 .
APA Li, Fushuai , Lin, Ruiquan , Chen, Wencheng , Wang, Jun , Shu, Feng , Chen, Riqing . Thwarting SSDF Attacks From High-Speed Movement VUs in the CIoV Network: Based on Blockchain and Stochastic Evolutionary Game . | IEEE INTERNET OF THINGS JOURNAL , 2025 , 12 (2) , 2233-2250 .
Export to NoteExpress RIS BibTex

Version :

Thwarting SSDF Attacks From High-Speed Movement VUs in the CIoV Network: Based on Blockchain and Stochastic Evolutionary Game EI
期刊论文 | 2025 , 12 (2) , 2233-2250 | IEEE Internet of Things Journal
Thwarting SSDF Attacks from High-Speed Movement VUs in the CIoV Network: Based on Blockchain and Stochastic Evolutionary Game Scopus
期刊论文 | 2024 , 12 (2) , 2233-2250 | IEEE Internet of Things Journal
Physical-Layer Security Enhancement in Energy-Harvesting-Based Cognitive Internet of Things: A GAN-Powered Deep Reinforcement Learning Approach SCIE
期刊论文 | 2024 , 11 (3) , 4899-4913 | IEEE INTERNET OF THINGS JOURNAL
WoS CC Cited Count: 12
Abstract&Keyword Cite Version(2)

Abstract :

Cognitive radio (CR) is regarded as the key technology of the 6th-Generation (6G) wireless network. Because 6G CR networks are anticipated to offer worldwide coverage, increase cost efficiency, enhance spectrum utilization, and improve device intelligence and network safety. This article studies the secrecy communication in an energy-harvesting (EH)-enabled Cognitive Internet of Things (EH-CIoT) network with a cooperative jammer. The secondary transmitters (STs) and the jammer first harvest the energy from the received radio frequency (RF) signals in the EH phase. Then, in the subsequent wireless information transfer (WIT) phase, the STs transmit secrecy information to their intended receivers in the presence of eavesdroppers while the jammer sends the jamming signal to confuse the eavesdroppers. To evaluate the system secrecy performance, we derive the instantaneous secrecy rate and the closed-form expression of secrecy outage probability (SOP). Furthermore, we propose a deep reinforcement learning (DRL)-based framework for the joint EH time and transmission power allocation problems. Specifically, a pair of ST and jammer over each time block is modeled as an agent which is dynamically interacting with the environment by the state, action, and reward mechanisms. To better find the optimal solutions to the proposed problems, the long short-term memory (LSTM) network and the generative adversarial networks (GANs) are combined with the classical DRL algorithm. The simulation results show that our proposed method is highly effective in maximizing the secrecy rate while minimizing the SOP compared with other existing schemes.

Keyword :

6G mobile communication 6G mobile communication Cognitive radio (CR) network Cognitive radio (CR) network Communication system security Communication system security deep reinforcement learning (DRL) deep reinforcement learning (DRL) energy harvesting (EH) energy harvesting (EH) Internet of Things Internet of Things Jamming Jamming Mobile handsets Mobile handsets physical-layer security (PLS) enhancement physical-layer security (PLS) enhancement Resource management Resource management Wireless communication Wireless communication

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Lin, Ruiquan , Qiu, Hangding , Wang, Jun et al. Physical-Layer Security Enhancement in Energy-Harvesting-Based Cognitive Internet of Things: A GAN-Powered Deep Reinforcement Learning Approach [J]. | IEEE INTERNET OF THINGS JOURNAL , 2024 , 11 (3) : 4899-4913 .
MLA Lin, Ruiquan et al. "Physical-Layer Security Enhancement in Energy-Harvesting-Based Cognitive Internet of Things: A GAN-Powered Deep Reinforcement Learning Approach" . | IEEE INTERNET OF THINGS JOURNAL 11 . 3 (2024) : 4899-4913 .
APA Lin, Ruiquan , Qiu, Hangding , Wang, Jun , Zhang, Zaichen , Wu, Liang , Shu, Feng . Physical-Layer Security Enhancement in Energy-Harvesting-Based Cognitive Internet of Things: A GAN-Powered Deep Reinforcement Learning Approach . | IEEE INTERNET OF THINGS JOURNAL , 2024 , 11 (3) , 4899-4913 .
Export to NoteExpress RIS BibTex

Version :

Physical Layer Security Enhancement in Energy Harvesting-based Cognitive Internet of Things: A GAN-Powered Deep Reinforcement Learning Approach Scopus
期刊论文 | 2023 , 11 (3) , 1-1 | IEEE Internet of Things Journal
Physical-Layer Security Enhancement in Energy-Harvesting-Based Cognitive Internet of Things: A GAN-Powered Deep Reinforcement Learning Approach EI
期刊论文 | 2024 , 11 (3) , 4899-4913 | IEEE Internet of Things Journal
Defense Management Mechanism for Primary User Emulation Attack Based on Evolutionary Game in Energy Harvesting Cognitive Industrial Internet of Things SCIE
期刊论文 | 2024 , 21 (4) , 4777-4786 | IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
Abstract&Keyword Cite Version(2)

Abstract :

Cognitive Industrial Internet of Things (CIIoT) permits Secondary Users (SUs) to use the spectrum bands owned by Primary Users (PUs) opportunistically. However, in the absence of the PUs, the selfish SUs could mislead the normal SUs to leave the spectrum bands by initiating a Primary User Emulation Attack (PUEA). In addition, the application of Energy Harvesting (EH) technology can exacerbate the threat of security. Because the energy cost of initiating a PUEA is offset to some extent by EH technology which can proactively replenish the energy of the selfish nodes. Thus, EH technology can increase the motivation of the selfish SUs to initiate a PUEA. To address the higher motivation of the selfish SUs attacking in CIIoT scenario where the EH technology is applied, in this paper, an EH-PUEA system model is first established to study the security countermeasures in this severe scenario of PUEA problems. Next, a new reward and punishment defense management mechanism is proposed, and then the dynamics of the selfish SUs and the normal SUs in a CIIoT network are studied based on Evolutionary Game Theory (EGT), and the punishment parameter is adjusted according to the dynamics of the selfish SUs to reduce the proportion of the selfish SUs' group choosing an attack strategy, so as to increase the throughput achieved by the normal SUs' group. Finally, the simulation results show that the proposed mechanism is superior to the conventional mechanism in terms of throughput achieved by the normal SUs' group in CIIoT scenario with EH technology applied.

Keyword :

Cognitive industrial Internet of Things (CIIoT) Cognitive industrial Internet of Things (CIIoT) Energy harvesting Energy harvesting energy harvesting (EH) energy harvesting (EH) evolutionary game theory (EGT) evolutionary game theory (EGT) Games Games Game theory Game theory Industrial Internet of Things Industrial Internet of Things Jamming Jamming primary user emulation attack (PUEA) primary user emulation attack (PUEA) Security Security Throughput Throughput

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Wang, Jun , Pei, Hai , Wang, Ruiliang et al. Defense Management Mechanism for Primary User Emulation Attack Based on Evolutionary Game in Energy Harvesting Cognitive Industrial Internet of Things [J]. | IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT , 2024 , 21 (4) : 4777-4786 .
MLA Wang, Jun et al. "Defense Management Mechanism for Primary User Emulation Attack Based on Evolutionary Game in Energy Harvesting Cognitive Industrial Internet of Things" . | IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 21 . 4 (2024) : 4777-4786 .
APA Wang, Jun , Pei, Hai , Wang, Ruiliang , Lin, Ruiquan , Fang, Zhou , Shu, Feng . Defense Management Mechanism for Primary User Emulation Attack Based on Evolutionary Game in Energy Harvesting Cognitive Industrial Internet of Things . | IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT , 2024 , 21 (4) , 4777-4786 .
Export to NoteExpress RIS BibTex

Version :

Defense Management Mechanism for Primary User Emulation Attack Based on Evolutionary Game in Energy Harvesting Cognitive Industrial Internet of Things Scopus
期刊论文 | 2024 , 21 (4) , 1-1 | IEEE Transactions on Network and Service Management
Defense Management Mechanism for Primary User Emulation Attack Based on Evolutionary Game in Energy Harvesting Cognitive Industrial Internet of Things EI
期刊论文 | 2024 , 21 (4) , 4777-4786 | IEEE Transactions on Network and Service Management
Blockchain and Game Theory-Based Strategies for Anti-Jamming and Eavesdropping in EH-CR Networks SCIE
期刊论文 | 2024 , 12 , 146996-147011 | IEEE ACCESS
Abstract&Keyword Cite Version(1)

Abstract :

In Cognitive Radio (CR) networks combined with Energy Harvesting (EH) technology, Secondary Users (SUs) are vulnerable to jamming attacks when sensing idle channels. At the same time, they may encounter numerous jamming and eavesdropping attacks during the data transmission phase. This paper examines the scenario in which SUs are susceptible to malicious attacks and energy constraints in both the sensing and transmission phases. We propose a utility function applicable to a single time slot. The blockchain uses Smart Contract (SC) technology to set rewards and punishments for users' channel selection behavior and adjust mining difficulty. This method combines blockchain with spectrum sensing data fusion, abandons the decision-making mechanism of the traditional Cooperative Spectrum Sensing (CSS) Fusion Center (FC), and adopts a distributed structure to ensure the security and reliability of sensing data fusion. In addition, this paper uses the potential game and the Stackelberg game to study the optimal transmission channel and optimal time slot allocation strategy for SUs under malicious attacks. Considering the possible interference caused by channel switching and the greedy principle of Malicious User (MU), the proposed two-layer game method gradually optimizes the sensing detection probability and secure communication rate with time slot iteration. In order to further improve the secure communication rate, an iterative update formula for transmission power is given to make reasonable use of the remaining energy of each SU at the end of each time slot. Simulation results show that the proposed method is superior to traditional methods in both sensing performance and secure communication rate.

Keyword :

blockchain blockchain Blockchains Blockchains Eavesdropping Eavesdropping eavesdropping attack eavesdropping attack Energy harvesting Energy harvesting Full-duplex system Full-duplex system Games Games Jamming Jamming jamming attack jamming attack Power system reliability Power system reliability Probability Probability Security Security Sensors Sensors Throughput Throughput two-layer game two-layer game

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Hou, Haifeng , Lin, Ruiquan , Wang, Jun et al. Blockchain and Game Theory-Based Strategies for Anti-Jamming and Eavesdropping in EH-CR Networks [J]. | IEEE ACCESS , 2024 , 12 : 146996-147011 .
MLA Hou, Haifeng et al. "Blockchain and Game Theory-Based Strategies for Anti-Jamming and Eavesdropping in EH-CR Networks" . | IEEE ACCESS 12 (2024) : 146996-147011 .
APA Hou, Haifeng , Lin, Ruiquan , Wang, Jun , Li, Sheng , Chen, Wencheng . Blockchain and Game Theory-Based Strategies for Anti-Jamming and Eavesdropping in EH-CR Networks . | IEEE ACCESS , 2024 , 12 , 146996-147011 .
Export to NoteExpress RIS BibTex

Version :

Blockchain and Game Theory-Based Strategies for Anti-Jamming and Eavesdropping in EH-CR Networks Scopus
期刊论文 | 2024 | IEEE Access
Defending Against SSDF Attacks From Randomly Appearing Intelligent Malicious Vehicle Users in the CIoV Network by Bayesian Stackelberg Game SCIE
期刊论文 | 2024 , 24 (19) , 31310-31323 | IEEE SENSORS JOURNAL
Abstract&Keyword Cite Version(2)

Abstract :

This article proposes an incomplete information Bayesian Stackelberg game, which is adapted to the Cognitive Internet of Vehicles (CIoVs) network to defend against spectrum sensing data falsification (SSDF) attacks from malicious vehicle users (MVUs). Specifically, this article considers the random appearance of MVUs caused by mobility, intelligent SSDF attacks of MVUs, and the different spectrum sensing performances among vehicle users (VUs). In the game, the fusion center (FC) as the leader aims to improve the global detection performance while effectively identifying the identities of different VUs by optimizing the global decision threshold and the reputation threshold. On the other hand, this article models the random appearance of MVUs as a Poisson random process, and the MVUs are the intelligent followers; they optimize the attack probabilities according to the FC's strategies to evade detection and increase the chance of selfish transmission and the damage to the CIoV network. To solve the MVUs' nonconvex optimization problem, this article uses the successive convex approximation (SCA) technique to obtain MVUs' optimal attack probabilities. For the FC, this article proposes the method combining alternating optimization and SCA to solve the nonconvex optimization problem of the FC and obtain its optimal defense strategies. This article also proves the convergence of the proposed method and the existence of the Stackelberg equilibrium (SE). The simulation results demonstrate the validity and superiority of the proposed method compared with traditional methods.

Keyword :

Bayes methods Bayes methods Cognitive Internet of Vehicles (CIoVs) Cognitive Internet of Vehicles (CIoVs) Games Games game theory game theory Intelligent sensors Intelligent sensors Internet of Vehicles Internet of Vehicles Optimization Optimization physical layer security physical layer security Random processes Random processes Sensors Sensors spectrum sensing data falsification (SSDF) attacks spectrum sensing data falsification (SSDF) attacks

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Li, Fushuai , Lin, Ruiquan , Chen, Wencheng et al. Defending Against SSDF Attacks From Randomly Appearing Intelligent Malicious Vehicle Users in the CIoV Network by Bayesian Stackelberg Game [J]. | IEEE SENSORS JOURNAL , 2024 , 24 (19) : 31310-31323 .
MLA Li, Fushuai et al. "Defending Against SSDF Attacks From Randomly Appearing Intelligent Malicious Vehicle Users in the CIoV Network by Bayesian Stackelberg Game" . | IEEE SENSORS JOURNAL 24 . 19 (2024) : 31310-31323 .
APA Li, Fushuai , Lin, Ruiquan , Chen, Wencheng , Wang, Jun , Hu, Jinsong , Shu, Feng . Defending Against SSDF Attacks From Randomly Appearing Intelligent Malicious Vehicle Users in the CIoV Network by Bayesian Stackelberg Game . | IEEE SENSORS JOURNAL , 2024 , 24 (19) , 31310-31323 .
Export to NoteExpress RIS BibTex

Version :

Defending Against SSDF Attacks from Randomly Appearing Intelligent Malicious Vehicle Users in the CIoV Network by Bayesian Stackelberg Game Scopus
期刊论文 | 2024 , 24 (19) , 1-1 | IEEE Sensors Journal
Defending Against SSDF Attacks From Randomly Appearing Intelligent Malicious Vehicle Users in the CIoV Network by Bayesian Stackelberg Game EI
期刊论文 | 2024 , 24 (19) , 31310-31323 | IEEE Sensors Journal
A Blockchain-Based Method to Defend Against Massive SSDF Attacks in Cognitive Internet of Vehicles SCIE
期刊论文 | 2024 , 73 (5) , 6954-6967 | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
WoS CC Cited Count: 3
Abstract&Keyword Cite Version(2)

Abstract :

The high-speed movement of Vehicle Users (VUs) in Cognitive Internet of Vehicles (CIoV) causes rapid changes in users location and path loss. In the case of imperfect control channels, the influence of high-speed movement increases the probability of error in sending local spectrum sensing decisions by VUs. On the other hand, Malicious Vehicle Users (MVUs) can launch Spectrum Sensing Data Falsification (SSDF) attacks to deteriorate the spectrum sensing decisions, mislead the final spectrum sensing decisions of Collaborative Spectrum Sensing (CSS), and bring serious security problems to the system. In addition, the high-speed movement can increases the concealment of the MVUs. In this paper, we study the scenario of VUs moving at high speeds, and data transmission in an imperfect control channel, and propose a blockchain-based method to defend against massive SSDF attacks in CIoV networks to prevennt independent and cooperative attacks from MVUs. The proposed method combines blockchain with spectrum sensing and spectrum access, abandons the decision-making mechanism of the Fusion Center (FC) in the traditional CSS, adopts distributed decision-making, and uses Prospect Theory (PT) modeling in the decision-making process, effectively improves the correct rate of final spectrum sensing decision in the case of multiple attacks. The local spectrum sensing decisions of VUs are packaged into blocks and uploaded after the final decision to achieve more accurate and secure spectrum sensing, and then identify MVUs by the reputation value. In addition, a smart contract that changes the mining difficulty of VUs based on their reputation values is proposed. It makes the mining difficulty of MVUs more difficult and effectively limits MVUs' access to the spectrum band. The final simulation results demonstrate the validity and superiority of the proposed method compared with traditional methods.

Keyword :

blockchain blockchain Blockchains Blockchains Cognitive Internet of Vehicles (CIoV) Cognitive Internet of Vehicles (CIoV) Data communication Data communication Decision making Decision making History History Internet of Vehicles Internet of Vehicles prospect theory (PT) prospect theory (PT) Sensors Sensors smart contract smart contract Smart contracts Smart contracts spectrum sensing data falsification (SSDF) attack spectrum sensing data falsification (SSDF) attack

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Lin, Ruiquan , Li, Fushuai , Wang, Jun et al. A Blockchain-Based Method to Defend Against Massive SSDF Attacks in Cognitive Internet of Vehicles [J]. | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2024 , 73 (5) : 6954-6967 .
MLA Lin, Ruiquan et al. "A Blockchain-Based Method to Defend Against Massive SSDF Attacks in Cognitive Internet of Vehicles" . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 73 . 5 (2024) : 6954-6967 .
APA Lin, Ruiquan , Li, Fushuai , Wang, Jun , Hu, Jinsong , Zhang, Zaichen , Wu, Liang . A Blockchain-Based Method to Defend Against Massive SSDF Attacks in Cognitive Internet of Vehicles . | IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , 2024 , 73 (5) , 6954-6967 .
Export to NoteExpress RIS BibTex

Version :

A Blockchain-Based Method to Defend Against Massive SSDF Attacks in Cognitive Internet of Vehicles Scopus
期刊论文 | 2024 , 73 (5) , 6954-6967 | IEEE Transactions on Vehicular Technology
A Blockchain-Based Method to Defend Against Massive SSDF Attacks in Cognitive Internet of Vehicles EI
期刊论文 | 2024 , 73 (5) , 6954-6967 | IEEE Transactions on Vehicular Technology
Optimal resource allocation method for energy harvesting based underlay Cognitive Radio networks (vol 18, e0279886, 2023) SCIE
期刊论文 | 2024 , 19 (12) | PLOS ONE
Abstract&Keyword Cite

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Liao, Jianbin , Yu, Hongliang , Jiang, Weibin et al. Optimal resource allocation method for energy harvesting based underlay Cognitive Radio networks (vol 18, e0279886, 2023) [J]. | PLOS ONE , 2024 , 19 (12) .
MLA Liao, Jianbin et al. "Optimal resource allocation method for energy harvesting based underlay Cognitive Radio networks (vol 18, e0279886, 2023)" . | PLOS ONE 19 . 12 (2024) .
APA Liao, Jianbin , Yu, Hongliang , Jiang, Weibin , Lin, Ruiquan , Wang, Jun . Optimal resource allocation method for energy harvesting based underlay Cognitive Radio networks (vol 18, e0279886, 2023) . | PLOS ONE , 2024 , 19 (12) .
Export to NoteExpress RIS BibTex

Version :

Machine learning-based non-destructive terahertz detection of seed quality in peanut SCIE
期刊论文 | 2024 , 23 | FOOD CHEMISTRY-X
WoS CC Cited Count: 4
Abstract&Keyword Cite Version(2)

Abstract :

Rapid identification of peanut seed quality is crucial for public health. In this study, we present a terahertz wave imaging system using a convolutional neural network (CNN) machine learning approach. Terahertz waves are capable of penetrating the seed shell to identify the quality of peanuts without causing any damage to the seeds. The specificity of seed quality on terahertz wave images is investigated, and the image characteristics of five different qualities are summarized. Terahertz wave images are digitized and used for training and testing of convolutional neural networks, resulting in a high model accuracy of 98.7% in quality identification. The trained THz-CNNs system can accurately identify standard, mildewed, defective, dried and germinated seeds, with an average detection time of 2.2 s. This process does not require any sample preparation steps such as concentration or culture. Our method swiftly and accurately assesses shelled seed quality non-destructively.

Keyword :

Aflatoxin Aflatoxin Machine learning Machine learning Peanut Peanut Quality identification Quality identification Terahertz imaging technology Terahertz imaging technology

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Jiang, Weibin , Wang, Jun , Lin, Ruiquan et al. Machine learning-based non-destructive terahertz detection of seed quality in peanut [J]. | FOOD CHEMISTRY-X , 2024 , 23 .
MLA Jiang, Weibin et al. "Machine learning-based non-destructive terahertz detection of seed quality in peanut" . | FOOD CHEMISTRY-X 23 (2024) .
APA Jiang, Weibin , Wang, Jun , Lin, Ruiquan , Chen, Riqing , Chen, Wencheng , Xie, Xin et al. Machine learning-based non-destructive terahertz detection of seed quality in peanut . | FOOD CHEMISTRY-X , 2024 , 23 .
Export to NoteExpress RIS BibTex

Version :

Machine learning-based non-destructive terahertz detection of seed quality in peanut Scopus
期刊论文 | 2024 , 23 | Food Chemistry: X
Machine learning-based non-destructive terahertz detection of seed quality in peanut EI
期刊论文 | 2024 , 23 | Food Chemistry: X
Anti-Jamming Resource-Allocation Method in the EH-CIoT Network through LWDDPG Algorithm SCIE
期刊论文 | 2024 , 24 (16) | SENSORS
Abstract&Keyword Cite Version(2)

Abstract :

In the Energy-Harvesting (EH) Cognitive Internet of Things (EH-CIoT) network, due to the broadcast nature of wireless communication, the EH-CIoT network is susceptible to jamming attacks, which leads to a serious decrease in throughput. Therefore, this paper investigates an anti-jamming resource-allocation method, aiming to maximize the Long-Term Throughput (LTT) of the EH-CIoT network. Specifically, the resource-allocation problem is modeled as a Markov Decision Process (MDP) without prior knowledge. On this basis, this paper carefully designs a two-dimensional reward function that includes throughput and energy rewards. On the one hand, the Agent Base Station (ABS) intuitively evaluates the effectiveness of its actions through throughput rewards to maximize the LTT. On the other hand, considering the EH characteristics and battery capacity limitations, this paper proposes energy rewards to guide the ABS to reasonably allocate channels for Secondary Users (SUs) with insufficient power to harvest more energy for transmission, which can indirectly improve the LTT. In the case where the activity states of Primary Users (PUs), channel information and the jamming strategies of the jammer are not available in advance, this paper proposes a Linearly Weighted Deep Deterministic Policy Gradient (LWDDPG) algorithm to maximize the LTT. The LWDDPG is extended from DDPG to adapt to the design of the two-dimensional reward function, which enables the ABS to reasonably allocate transmission channels, continuous power and work modes to the SUs, and to let the SUs not only transmit on unjammed channels, but also harvest more RF energy to supplement the battery power. Finally, the simulation results demonstrate the validity and superiority of the proposed method compared with traditional methods under multiple jamming attacks.

Keyword :

anti-jamming method anti-jamming method EH-CIoT network EH-CIoT network linearly weighted deep deterministic policy gradient linearly weighted deep deterministic policy gradient resource allocation resource allocation

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Li, Fushuai , Bao, Jiawang , Wang, Jun et al. Anti-Jamming Resource-Allocation Method in the EH-CIoT Network through LWDDPG Algorithm [J]. | SENSORS , 2024 , 24 (16) .
MLA Li, Fushuai et al. "Anti-Jamming Resource-Allocation Method in the EH-CIoT Network through LWDDPG Algorithm" . | SENSORS 24 . 16 (2024) .
APA Li, Fushuai , Bao, Jiawang , Wang, Jun , Liu, Da , Chen, Wencheng , Lin, Ruiquan . Anti-Jamming Resource-Allocation Method in the EH-CIoT Network through LWDDPG Algorithm . | SENSORS , 2024 , 24 (16) .
Export to NoteExpress RIS BibTex

Version :

Anti-Jamming Resource-Allocation Method in the EH-CIoT Network through LWDDPG Algorithm Scopus
期刊论文 | 2024 , 24 (16) | Sensors
Anti-Jamming Resource-Allocation Method in the EH-CIoT Network through LWDDPG Algorithm EI
期刊论文 | 2024 , 24 (16) | Sensors
Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks SCIE
期刊论文 | 2023 , 23 (2) | SENSORS
WoS CC Cited Count: 8
Abstract&Keyword Cite Version(2)

Abstract :

The paper studies the secrecy communication threatened by a single eavesdropper in Energy Harvesting (EH)-based cognitive radio networks, where both the Secure User (SU) and the jammer harvest, store, and utilize RF energy from the Primary Transmitter (PT). Our main goal is to optimize the time slots for energy harvesting and wireless communication for both the secure user as well as the jammer to maximize the long-term performance of secrecy communication. A multi-agent Deep Reinforcement Learning (DRL) method is proposed for solving the optimization of resource allocation and performance. Specifically, each sub-channel from the Secure Transmitter (ST) to the Secure Receiver (SR) link, along with the jammer to the eavesdropper link, is regarded as an agent, which is responsible for exploring optimal power allocation strategy while a time allocation network is established to obtain optimal EH time allocation strategy. Every agent dynamically interacts with the wireless communication environment. Simulation results demonstrate that the proposed DRL-based resource allocation method outperforms the existing schemes in terms of secrecy rate, convergence speed, and the average number of transition steps.

Keyword :

cognitive radio network cognitive radio network deep reinforcement learning deep reinforcement learning energy harvesting energy harvesting physical layer security physical layer security

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Lin, Ruiquan , Qiu, Hangding , Jiang, Weibin et al. Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks [J]. | SENSORS , 2023 , 23 (2) .
MLA Lin, Ruiquan et al. "Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks" . | SENSORS 23 . 2 (2023) .
APA Lin, Ruiquan , Qiu, Hangding , Jiang, Weibin , Jiang, Zhenglong , Li, Zhili , Wang, Jun . Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks . | SENSORS , 2023 , 23 (2) .
Export to NoteExpress RIS BibTex

Version :

Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks Scopus
期刊论文 | 2023 , 23 (2) | Sensors
Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks EI
期刊论文 | 2023 , 23 (2) | Sensors
10| 20| 50 per page
< Page ,Total 12 >

Export

Results:

Selected

to

Format:
Online/Total:39/10100899
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1