Recurrent Neural Network-based Anti-jamming Framework for Defense
Against Multiple Jamming Policies
- URL: http://arxiv.org/abs/2208.09518v1
- Date: Fri, 19 Aug 2022 19:12:38 GMT
- Title: Recurrent Neural Network-based Anti-jamming Framework for Defense
Against Multiple Jamming Policies
- Authors: Ali Pourranjbar, Georges Kaddoum, and Walid Saad
- Abstract summary: This paper proposes an anti-jamming method that can adapt its policy to the current jamming attack.
In both single and multiple jammers scenarios, the interaction between the users and jammers is modeled using recurrent neural networks (RNNs)
- Score: 77.53658708277409
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Conventional anti-jamming methods mainly focus on preventing single jammer
attacks with an invariant jamming policy or jamming attacks from multiple
jammers with similar jamming policies. These anti-jamming methods are
ineffective against a single jammer following several different jamming
policies or multiple jammers with distinct policies. Therefore, this paper
proposes an anti-jamming method that can adapt its policy to the current
jamming attack. Moreover, for the multiple jammers scenario, an anti-jamming
method that estimates the future occupied channels using the jammers' occupied
channels in previous time slots is proposed. In both single and multiple
jammers scenarios, the interaction between the users and jammers is modeled
using recurrent neural networks (RNN)s. The performance of the proposed
anti-jamming methods is evaluated by calculating the users' successful
transmission rate (STR) and ergodic rate (ER), and compared to a baseline based
on Q-learning (DQL). Simulation results show that for the single jammer
scenario, all the considered jamming policies are perfectly detected and high
STR and ER are maintained. Moreover, when 70 % of the spectrum is under jamming
attacks from multiple jammers, the proposed method achieves an STR and ER
greater than 75 % and 80 %, respectively. These values rise to 90 % when 30 %
of the spectrum is under jamming attacks. In addition, the proposed
anti-jamming methods significantly outperform the DQL method for all the
considered cases and jamming scenarios.
Related papers
- Fast Adaptive Anti-Jamming Channel Access via Deep Q Learning and Coarse-Grained Spectrum Prediction [13.4498936010732]
This paper investigates the anti-jamming channel access problem in complex and unknown jamming environments.
Traditional channel hopping anti-jamming approaches using fixed patterns are ineffective against dynamic jamming attacks.
We propose a fast adaptive anti-jamming channel access approach guided by the intuition of learning faster than the jammer'
arXiv Detail & Related papers (2025-02-07T14:25:28Z) - Achieving Hiding and Smart Anti-Jamming Communication: A Parallel DRL Approach against Moving Reactive Jammer [11.429298787140992]
reactive jammer initiates high-power tracking jamming upon detecting any transmission activity.
This presents dual imperatives: maintaining hiding to avoid the jammer's detection and simultaneously evading indiscriminate jamming.
Current methodologies struggle with the complexity of simultaneously optimizing these two requirements.
arXiv Detail & Related papers (2025-02-04T15:03:11Z) - Achieving $\widetilde{\mathcal{O}}(\sqrt{T})$ Regret in Average-Reward POMDPs with Known Observation Models [56.92178753201331]
We tackle average-reward infinite-horizon POMDPs with an unknown transition model.
We present a novel and simple estimator that overcomes this barrier.
arXiv Detail & Related papers (2025-01-30T22:29:41Z) - Improved Generation of Adversarial Examples Against Safety-aligned LLMs [72.38072942860309]
Adversarial prompts generated using gradient-based methods exhibit outstanding performance in performing automatic jailbreak attacks against safety-aligned LLMs.
In this paper, we explore a new perspective on this problem, suggesting that it can be alleviated by leveraging innovations inspired in transfer-based attacks.
We show that 87% of the query-specific adversarial suffixes generated by the developed combination can induce Llama-2-7B-Chat to produce the output that exactly matches the target string on AdvBench.
arXiv Detail & Related papers (2024-05-28T06:10:12Z) - Query Efficient Cross-Dataset Transferable Black-Box Attack on Action
Recognition [99.29804193431823]
Black-box adversarial attacks present a realistic threat to action recognition systems.
We propose a new attack on action recognition that addresses these shortcomings by generating perturbations.
Our method achieves 8% and higher 12% deception rates compared to state-of-the-art query-based and transfer-based attacks.
arXiv Detail & Related papers (2022-11-23T17:47:49Z) - Jamming Pattern Recognition over Multi-Channel Networks: A Deep Learning
Approach [88.72160601701937]
An intelligent jammer is able to change its policy to minimize the probability of being traced by legitimate nodes.
Existing anti-jamming methods are not applicable here because they mainly focus on mitigating jamming attacks with an invariant jamming policy.
This paper proposes a jamming type recognition technique working alongside an anti-jamming technique.
arXiv Detail & Related papers (2021-12-19T04:29:23Z) - Reinforcement Learning for Deceiving Reactive Jammers in Wireless
Networks [76.82565500647323]
A novel anti-jamming strategy is proposed based on the idea of deceiving the jammer into attacking a victim channel.
Since the jammer's channel information is not known to the users, an optimal channel selection scheme and a sub optimal power allocation are proposed.
Simulation results show that the proposed anti-jamming method outperforms the compared RL based anti-jamming methods and random search method.
arXiv Detail & Related papers (2021-03-25T18:12:41Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.