Biased Stackelberg game‐based UAV relay anti‐jamming communications: Exploiting trajectory optimization and transmission mode selection
Although unmanned aerial vehicle (UAV) relay can provide auxiliary communication due to its flexible mobility, it is vulnerable to jamming attacks. This paper considers the UAV relay anti‐jamming communication issue under the threat of a malicious jammer with beam‐forming jamming capability. To prev...
Saved in:
Published in | IET communications Vol. 16; no. 20; pp. 2467 - 2478 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Stevenage
John Wiley & Sons, Inc
01.12.2022
Wiley |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Although unmanned aerial vehicle (UAV) relay can provide auxiliary communication due to its flexible mobility, it is vulnerable to jamming attacks. This paper considers the UAV relay anti‐jamming communication issue under the threat of a malicious jammer with beam‐forming jamming capability. To prevent the relay link from deteriorating, UAV trajectory adjustment and transmission mode switching between half‐duplex and full‐duplex are two available schemes, while they will incur the additional flying costs and continuous mode switching, respectively. To balance the trade‐off between trajectory optimization and mode selection, this paper investigates the joint trajectory optimization and mode selection anti‐jamming approach. First, an anti‐jamming utility considering the cost‐efficient and end‐to‐end capacity gains is designed. Second, to model the bounded rationality of both the UAV relay and the jammer due to the adversarial context, a biased Stackelberg game to analyse the competitive system interactions is proposed. Moreover, the existence of Stackelberg equilibrium (SE) in the problem is proved. Finally, a joint mode selection and trajectory optimization (JMSTO) algorithm based on the multi‐armed bandit is proposed to obtain the SE. It is further demonstrated that the JMSTO algorithm has a logarithmic regret. The results show that our proposed JMSTO algorithm is superior to non‐joint optimization methods. |
---|---|
AbstractList | Although unmanned aerial vehicle (UAV) relay can provide auxiliary communication due to its flexible mobility, it is vulnerable to jamming attacks. This paper considers the UAV relay anti‐jamming communication issue under the threat of a malicious jammer with beam‐forming jamming capability. To prevent the relay link from deteriorating, UAV trajectory adjustment and transmission mode switching between half‐duplex and full‐duplex are two available schemes, while they will incur the additional flying costs and continuous mode switching, respectively. To balance the trade‐off between trajectory optimization and mode selection, this paper investigates the joint trajectory optimization and mode selection anti‐jamming approach. First, an anti‐jamming utility considering the cost‐efficient and end‐to‐end capacity gains is designed. Second, to model the bounded rationality of both the UAV relay and the jammer due to the adversarial context, a biased Stackelberg game to analyse the competitive system interactions is proposed. Moreover, the existence of Stackelberg equilibrium (SE) in the problem is proved. Finally, a joint mode selection and trajectory optimization (JMSTO) algorithm based on the multi‐armed bandit is proposed to obtain the SE. It is further demonstrated that the JMSTO algorithm has a logarithmic regret. The results show that our proposed JMSTO algorithm is superior to non‐joint optimization methods. Abstract Although unmanned aerial vehicle (UAV) relay can provide auxiliary communication due to its flexible mobility, it is vulnerable to jamming attacks. This paper considers the UAV relay anti‐jamming communication issue under the threat of a malicious jammer with beam‐forming jamming capability. To prevent the relay link from deteriorating, UAV trajectory adjustment and transmission mode switching between half‐duplex and full‐duplex are two available schemes, while they will incur the additional flying costs and continuous mode switching, respectively. To balance the trade‐off between trajectory optimization and mode selection, this paper investigates the joint trajectory optimization and mode selection anti‐jamming approach. First, an anti‐jamming utility considering the cost‐efficient and end‐to‐end capacity gains is designed. Second, to model the bounded rationality of both the UAV relay and the jammer due to the adversarial context, a biased Stackelberg game to analyse the competitive system interactions is proposed. Moreover, the existence of Stackelberg equilibrium (SE) in the problem is proved. Finally, a joint mode selection and trajectory optimization (JMSTO) algorithm based on the multi‐armed bandit is proposed to obtain the SE. It is further demonstrated that the JMSTO algorithm has a logarithmic regret. The results show that our proposed JMSTO algorithm is superior to non‐joint optimization methods. Although unmanned aerial vehicle (UAV) relay can provide auxiliary communication due to its flexible mobility, it is vulnerable to jamming attacks. This paper considers the UAV relay anti‐jamming communication issue under the threat of a malicious jammer with beam‐forming jamming capability. To prevent the relay link from deteriorating, UAV trajectory adjustment and transmission mode switching between half‐duplex and full‐duplex are two available schemes, while they will incur the additional flying costs and continuous mode switching, respectively. To balance the trade‐off between trajectory optimization and mode selection, this paper investigates the joint trajectory optimization and mode selection anti‐jamming approach. First, an anti‐jamming utility considering the cost‐efficient and end‐to‐end capacity gains is designed. Second, to model the bounded rationality of both the UAV relay and the jammer due to the adversarial context, a biased Stackelberg game to analyse the competitive system interactions is proposed. Moreover, the existence of Stackelberg equilibrium (SE) in the problem is proved. Finally, a joint mode selection and trajectory optimization (JMSTO) algorithm based on the multi‐armed bandit is proposed to obtain the SE. It is further demonstrated that the JMSTO algorithm has a logarithmic regret. The results show that our proposed JMSTO algorithm is superior to non‐joint optimization methods. |
Author | Su, Zhe Jia, Luliang Wu, Qihui Qi, Nan Du, Zhiyong |
Author_xml | – sequence: 1 givenname: Zhe orcidid: 0000-0002-2987-3484 surname: Su fullname: Su, Zhe organization: Nanjing University of Aeronautics and Astronautics – sequence: 2 givenname: Qihui surname: Wu fullname: Wu, Qihui email: wuqihui2014@sina.com organization: Nanjing University of Aeronautics and Astronautics – sequence: 3 givenname: Nan orcidid: 0000-0002-0125-370X surname: Qi fullname: Qi, Nan organization: Southeast University – sequence: 4 givenname: Luliang surname: Jia fullname: Jia, Luliang organization: Space Engineering University – sequence: 5 givenname: Zhiyong surname: Du fullname: Du, Zhiyong organization: National University of Defense Technology |
BookMark | eNp9kc1u1DAUhSNUJPrDhieIxA5piu3YxmZXRm2pVNQFDFvrxnZGDnE82B7BdNU9G56RJ8FJgAVCrGzf-52j63tOqqMxjLaqnmF0jhGVL7Xfk3NMGCKPqmP8iuGV4A0_-nMn4kl1klKPEGOc0uPq2xsHyZr6fQb9yQ6tjdt6C97-ePjezo3Nxcc62gEONYzZlXIP3rtxW-vg_X50GrILY3pdX37dDcHlqZUj9FbnEA912GXn3f0MFQcz9cbkXUpTwQdj62SHApfnWfW4gyHZp7_O02pzdflh_XZ1e3d9s764XWlKCVkJIxhoTCWRHAPgFowVWhqEiMSSgwbDsJbUUoaEAUvLXxsheMuhaxveNKfVzeJrAvRqF52HeFABnJoLIW4VxOz0YBWhBmMNVCDZUdagFtGOI902rTFMC1K8ni9euxg-723Kqg_7OJbxVYMkKRMhOlFooXQMKUXbKe3yvJOyDjcojNQUn5riU3N8RfLiL8nvQf8J4wX-4gZ7-A-p1u82ZNH8BKSQsRM |
CitedBy_id | crossref_primary_10_3390_electronics12204344 |
Cites_doi | 10.1109/ICCChina.2016.7636793 10.1109/TWC.2016.2531652 10.1109/WCSP52459.2021.9613616 10.1109/LWC.2021.3100113 10.1109/TCOMM.2021.3064569 10.1049/cmu2.12107 10.1002/wcm.2525 10.1109/ICNP.2011.6089079 10.1109/ACCESS.2018.2867849 10.1109/JSAC.2018.2864375 10.1109/ACCESS.2019.2907962 10.1109/LCOMM.2019.2949274 10.1109/VTCSpring.2018.8417733 10.1109/TVT.2019.2935999 10.1109/TWC.2017.2689005 10.1109/MRA.2012.2206473 10.1109/COMST.2015.2495297 10.1109/TCOMM.2016.2611512 10.1109/TGCN.2017.2767203 10.2307/1427934 10.23919/ICN.2021.0010 10.1109/VTC2020-Spring48590.2020.9128716 10.1109/TVT.2021.3089158 10.1109/JSEN.2019.2958966 10.1109/JIOT.2021.3103196 10.1109/COMST.2019.2902862 10.1109/TCOMM.2019.2947918 10.1109/ACCESS.2019.2893459 10.1109/WCNC.2018.8377137 10.1109/MWC.001.1900280 10.1016/0196-8858(85)90002-8 10.1109/TMC.2020.3048480 10.1109/TVT.2017.2753280 10.1109/ACCESS.2019.2946353 10.1109/MWC.001.1900207 10.1109/VTCSpring.2013.6692490 10.1109/ACCESS.2018.2850879 10.1109/ICCC51575.2020.9344934 10.1109/LCOMM.2016.2598808 10.1109/MWC.2019.1800601 10.1023/A:1013689704352 10.1109/TIFS.2020.3005336 10.1109/LCOMM.2018.2800737 10.1007/s11276-016-1428-3 10.1109/JIOT.2021.3113128 10.1109/JIOT.2020.3027621 10.1109/LWC.2017.2747543 10.1037/h0042769 10.1109/TVT.2018.2789466 10.1109/MWC.2018.1800023 10.1109/JIOT.2019.2903165 10.1109/SPAWC.2009.5161790 10.1016/j.artint.2010.07.002 10.1109/TWC.2018.2859394 10.1109/ICC.2019.8761467 10.1109/LCOMM.2017.2776215 10.1109/LWC.2014.2342736 |
ContentType | Journal Article |
Copyright | 2022 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. 2022. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the "License"). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2022 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. – notice: 2022. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the "License"). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | 24P AAYXX CITATION 8FE 8FG ABJCF AFKRA ARAPS BENPR BGLVJ CCPQU DWQXO HCIFZ L6V M7S P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS S0W DOA |
DOI | 10.1049/cmu2.12502 |
DatabaseName | Wiley Open Access (UHCL Subscription) CrossRef ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Databases Technology Collection ProQuest One Community College ProQuest Central Korea SciTech Premium Collection ProQuest Engineering Collection Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection DELNET Engineering & Technology Collection DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Advanced Technologies & Aerospace Collection Engineering Database Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest One Academic Eastern Edition SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest DELNET Engineering and Technology Collection Materials Science & Engineering Collection ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) Engineering Collection |
DatabaseTitleList | CrossRef Advanced Technologies & Aerospace Collection |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: 24P name: Wiley Online Library Open Access url: https://authorservices.wiley.com/open-science/open-access/browse-journals.html sourceTypes: Publisher – sequence: 3 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1751-8636 |
EndPage | 2478 |
ExternalDocumentID | oai_doaj_org_article_24d11ca4809f4530b04f60cb3bdd5c82 10_1049_cmu2_12502 CMU212502 |
Genre | article |
GrantInformation_xml | – fundername: Fundamental Research Funds for the Central Universities funderid: NT2021017 – fundername: National Natural Science Foundation of China funderid: 61827801; 61801218; 61901523; 62031012; 62271253; 62071223 – fundername: National Key R&D Program of China funderid: 2018YFB1800800 – fundername: National Natural Science Foundation of China under Key Project funderid: 61931011 |
GroupedDBID | .DC 0R~ 0ZK 1OC 24P 29I 2QL 4.4 4IJ 5GY 6IK 6OB 8FE 8FG 8VB 96U AAHHS AAHJG AAJGR ABJCF ABQXS ACCFJ ACCMX ACESK ACGFO ACGFS ACIWK ACXQS ADEYR AEEZP AEGXH AENEX AEQDE AFAZI AFKRA AIAGR AIWBW AJBDE ALMA_UNASSIGNED_HOLDINGS ALUQN ARAPS AVUZU BENPR BGLVJ CCPQU CS3 DU5 EBS EJD ESX F8P GOZPB GROUPED_DOAJ GRPMH HCIFZ HZ~ IAO IFIPE IPLJI ITC JAVBF K1G L6V LAI M43 M7S MCNEO MS~ NADUK NXXTH O9- OCL OK1 P62 PTHSS QWB RIE RNS ROL RUI S0W U5U UNMZH ZL0 ~ZZ AAYXX CITATION IDLOA PHGZM PHGZT DWQXO PKEHL PQEST PQGLB PQQKQ PQUKI PRINS WIN PUEGO |
ID | FETCH-LOGICAL-c4422-8d85ac1492961aa1bade8c9d0029196acad51c94e4508dae40553886b6afb3633 |
IEDL.DBID | 24P |
ISSN | 1751-8628 |
IngestDate | Wed Aug 27 01:31:24 EDT 2025 Wed Aug 13 09:27:03 EDT 2025 Tue Jul 01 05:15:51 EDT 2025 Thu Apr 24 22:54:54 EDT 2025 Wed Jan 22 16:21:09 EST 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 20 |
Language | English |
License | Attribution-NonCommercial-NoDerivs |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c4422-8d85ac1492961aa1bade8c9d0029196acad51c94e4508dae40553886b6afb3633 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-2987-3484 0000-0002-0125-370X |
OpenAccessLink | https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fcmu2.12502 |
PQID | 3092291042 |
PQPubID | 1936360 |
PageCount | 12 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_24d11ca4809f4530b04f60cb3bdd5c82 proquest_journals_3092291042 crossref_citationtrail_10_1049_cmu2_12502 crossref_primary_10_1049_cmu2_12502 wiley_primary_10_1049_cmu2_12502_CMU212502 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | December 2022 2022-12-00 20221201 2022-12-01 |
PublicationDateYYYYMMDD | 2022-12-01 |
PublicationDate_xml | – month: 12 year: 2022 text: December 2022 |
PublicationDecade | 2020 |
PublicationPlace | Stevenage |
PublicationPlace_xml | – name: Stevenage |
PublicationTitle | IET communications |
PublicationYear | 2022 |
Publisher | John Wiley & Sons, Inc Wiley |
Publisher_xml | – name: John Wiley & Sons, Inc – name: Wiley |
References | 2021; 69 2019; 7 2021; 8 2017; 6 2019; 6 2021; 2 2020; 20 2011 1985; 6 2009 2012; 19 2022; 21 2016; 18 2018; 67 2018; 22 2016; 16 2016; 15 2021; 70 2018; 24 2018; 6 2021; 16 2002; 47 2021; 15 2018; 17 2021; 10 2018; 2 2014; 3 1995; 27 2021 1956; 63 2019; 21 2020 2017; 16 2019; 68 2019; 26 2022; 9 2016; 64 2020; 27 2016; 20 2019 2018 2010; 174 2020; 24 2020; 68 2016 2013 2018; 36 e_1_2_9_31_1 e_1_2_9_52_1 e_1_2_9_50_1 e_1_2_9_10_1 e_1_2_9_35_1 e_1_2_9_56_1 e_1_2_9_12_1 e_1_2_9_33_1 e_1_2_9_54_1 e_1_2_9_14_1 e_1_2_9_39_1 e_1_2_9_16_1 e_1_2_9_37_1 e_1_2_9_58_1 e_1_2_9_18_1 e_1_2_9_41_1 e_1_2_9_20_1 e_1_2_9_22_1 e_1_2_9_45_1 e_1_2_9_24_1 e_1_2_9_43_1 e_1_2_9_8_1 e_1_2_9_6_1 e_1_2_9_4_1 e_1_2_9_2_1 e_1_2_9_26_1 e_1_2_9_49_1 e_1_2_9_28_1 e_1_2_9_47_1 e_1_2_9_30_1 e_1_2_9_53_1 e_1_2_9_51_1 e_1_2_9_11_1 e_1_2_9_34_1 e_1_2_9_57_1 e_1_2_9_13_1 e_1_2_9_32_1 e_1_2_9_55_1 e_1_2_9_15_1 e_1_2_9_38_1 e_1_2_9_17_1 e_1_2_9_36_1 e_1_2_9_19_1 e_1_2_9_42_1 e_1_2_9_40_1 e_1_2_9_21_1 e_1_2_9_46_1 e_1_2_9_23_1 e_1_2_9_44_1 e_1_2_9_7_1 e_1_2_9_5_1 e_1_2_9_3_1 e_1_2_9_9_1 e_1_2_9_25_1 e_1_2_9_27_1 e_1_2_9_48_1 e_1_2_9_29_1 |
References_xml | – volume: 6 start-page: 48688 year: 2018 end-page: 48696 article-title: Power and trajectory optimization for UAV‐enabled amplify‐and‐forward relay networks publication-title: IEEE Access – volume: 36 start-page: 1986 issue: 9 year: 2018 end-page: 1999 article-title: Spectrum sharing planning for full‐duplex UAV relaying systems with underlaid D2D communications publication-title: IEEE J. Sel. Areas Commun. – volume: 9 start-page: 6434 issue: 9 year: 2022 end-page: 6442 article-title: Multiagent Q‐learning‐based multi‐UAV wireless networks for maximizing energy efficiency: Deployment and power control strategy design publication-title: IEEE Internet Things J. – volume: 15 start-page: 1262 issue: 10 year: 2021 end-page: 1272 article-title: A survey on unmanned aerial vehicle relaying networks publication-title: IET Commun. – start-page: 1 year: 2018 end-page: 6 article-title: Deployment of multi‐layer UAV relay system – volume: 27 start-page: 1054 issue: 4 year: 1995 end-page: 1078 article-title: Sample mean based index policies by O (log n) regret for the multi‐armed bandit problem publication-title: Adv. Appl. Probab. – volume: 21 start-page: 2334 issue: 3 year: 2019 end-page: 2360 article-title: A tutorial on UAVs for wireless networks: Applications, challenges, and open problems publication-title: IEEE Commun. Surv. Tutor. – volume: 19 start-page: 46 issue: 3 year: 2012 end-page: 56 article-title: Toward a fully autonomous UAV: Research platform for indoor and outdoor urban search and rescue publication-title: IEEE Robot. Autom. Mag. – volume: 24 start-page: 155 issue: 1 year: 2020 end-page: 158 article-title: Optimal placement of UAV‐assisted free‐space optical communication systems with DF relaying publication-title: IEEE Commun. Lett. – volume: 26 start-page: 93 issue: 2 year: 2019 end-page: 99 article-title: Deep learning in physical layer communications publication-title: IEEE Wireless Commun. – volume: 7 start-page: 14623 year: 2019 end-page: 14636 article-title: Power control in relay‐assisted anti‐jamming systems: A Bayesian three‐layer Stackelberg game approach publication-title: IEEE Access – volume: 6 start-page: 818 issue: 6 year: 2017 end-page: 821 article-title: A hierarchical learning solution for anti‐jamming Stackelberg game with discrete power strategies publication-title: IEEE Wireless Commun. Lett. – volume: 63 start-page: 129 issue: 2 year: 1956 article-title: Rational choice and the structure of the environment publication-title: Psychol. Rev. – volume: 22 start-page: 248 issue: 2 year: 2018 end-page: 251 article-title: Optimum placement of UAV as relays publication-title: IEEE Commun. Lett. – volume: 15 start-page: 3949 issue: 6 year: 2016 end-page: 3963 article-title: Unmanned aerial vehicle with underlaid device‐to‐device communications: Performance and tradeoffs publication-title: IEEE Trans. Wireless Commun. – volume: 2 start-page: 150 issue: 2 year: 2021 end-page: 162 article-title: Distributed reinforcement learning based framework for energy‐efficient UAV relay against jamming publication-title: Intell. Converged Networks – volume: 9 start-page: 4356 issue: 6 year: 2022 end-page: 4370 article-title: Intelligent jamming defense using DNN Stackelberg game in sensor edge cloud publication-title: IEEE Internet Things J. – volume: 27 start-page: 48 issue: 4 year: 2020 end-page: 53 article-title: UAV‐aided cellular communications with deep reinforcement learning against jamming publication-title: IEEE Wireless Commun. – volume: 7 start-page: 147732 year: 2019 end-page: 147742 article-title: Throughput improvement for multi‐hop UAV relaying publication-title: IEEE Access – volume: 24 start-page: 1683 issue: 5 year: 2018 end-page: 1697 article-title: Opportunistic channel access with repetition time diversity and switching cost: A block multi‐armed bandit approach publication-title: Wirel. Netw. – start-page: 275 year: 2009 end-page: 279 article-title: On the feasibility of full‐duplex relaying in the presence of loop interference – volume: 20 start-page: 3930 issue: 7 year: 2020 end-page: 3945 article-title: Joint resource allocation and transmission mode selection using a POMDP‐based hybrid half‐duplex/full‐duplex scheme for secrecy rate maximization in multi‐channel cognitive radio networks publication-title: IEEE Sens. J. – volume: 3 start-page: 569 issue: 6 year: 2014 end-page: 572 article-title: Optimal lap altitude for maximum coverage publication-title: IEEE Wireless Commun. Lett. – volume: 26 start-page: 120 issue: 1 year: 2019 end-page: 127 article-title: Cellular‐connected UAV: Potential, challenges, and promising technologies publication-title: IEEE Wireless Commun. – volume: 7 start-page: 40913 year: 2019 end-page: 40924 article-title: UAV relay flight path planning in the presence of jamming signal publication-title: IEEE Access – volume: 2 start-page: 14 issue: 1 year: 2018 end-page: 24 article-title: Resource allocation for energy harvesting‐powered D2D communication underlaying UAV‐assisted networks publication-title: IEEE Trans. Green Commun. Networking – volume: 6 start-page: 4 issue: 1 year: 1985 end-page: 22 article-title: Asymptotically efficient adaptive allocation rules publication-title: Adv. Appl. Math. – volume: 6 start-page: 40177 year: 2018 end-page: 40188 article-title: A multi‐domain anti‐jamming defense scheme in heterogeneous wireless networks publication-title: IEEE Access – start-page: 1 year: 2013 end-page: 5 article-title: Cooperative communications against jamming with half‐duplex and full‐duplex relaying – start-page: 1 year: 2016 end-page: 5 article-title: Reinforcement learning based anti‐jamming with wideband autonomous cognitive radios – volume: 47 start-page: 235 issue: 2 year: 2002 end-page: 256 article-title: Finite‐time analysis of the multiarmed bandit problem publication-title: Mach. Learn. – volume: 22 start-page: 808 issue: 4 year: 2018 end-page: 811 article-title: Optimal node placement and resource allocation for UAV relaying network publication-title: IEEE Commun. Lett. – volume: 68 start-page: 9920 issue: 10 year: 2019 end-page: 9934 article-title: Cognitive risk control for anti‐jamming V2V communications in autonomous vehicle networks publication-title: IEEE Trans. Veh. Technol. – start-page: 1 year: 2018 end-page: 5 article-title: Using multiple UAVs as relays for reliable communications – volume: 18 start-page: 1123 issue: 2 year: 2016 end-page: 1152 article-title: Survey of important issues in UAV communication networks publication-title: IEEE Commun. Surv. Tutor. – volume: 64 start-page: 4983 issue: 12 year: 2016 end-page: 4996 article-title: Throughput maximization for UAV‐enabled mobile relaying systems publication-title: IEEE Trans. Commun. – start-page: 393 year: 2011 end-page: 402 article-title: Anti‐jamming communication in cognitive radio networks with unknown channel statistics – volume: 16 start-page: 3827 issue: 6 year: 2017 end-page: 3839 article-title: Physical layer security in wireless ad hoc networks under a hybrid full‐/half‐duplex receiver deployment strategy publication-title: IEEE Trans. Wireless Commun. – volume: 174 start-page: 1142 issue: 15 year: 2010 end-page: 1171 article-title: Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition publication-title: Artif. Intell. – start-page: 1 year: 2019 end-page: 5 article-title: Joint power and trajectory optimization in UAV anti‐jamming communication networks – volume: 21 start-page: 2861 issue: 8 year: 2022 end-page: 2875 article-title: Joint channel and link selection in formation‐keeping UAV networks: A two‐way consensus game publication-title: IEEE Trans. Mob. Comput. – volume: 6 start-page: 5508 issue: 3 year: 2019 end-page: 5519 article-title: DSF‐NOMA: UAV‐assisted emergency communication technology in a heterogeneous internet of things publication-title: IEEE Internet Things J. – volume: 67 start-page: 4087 issue: 5 year: 2018 end-page: 4097 article-title: UAV relay in VANETs against smart jamming with reinforcement learning publication-title: IEEE Trans. Veh. Technol. – volume: 27 start-page: 24 issue: 1 year: 2020 end-page: 30 article-title: Multi‐armed‐bandit‐based spectrum scheduling algorithms in wireless networks: A survey publication-title: IEEE Wireless Commun. – start-page: 1 year: 2021 end-page: 6 article-title: UAV‐aided anti‐jamming maritime communications: A deep reinforcement learning approach – start-page: 267 year: 2020 end-page: 272 article-title: A MAB‐based discrete power control approach in anti‐jamming relay communication via three‐layer Stackelberg game – volume: 10 start-page: 2350 issue: 11 year: 2021 end-page: 2354 article-title: A multi‐leader multi‐follower Stackelberg game for coalition‐based UAV MEC networks publication-title: IEEE Wireless Commun. Lett. – volume: 16 start-page: 441 issue: 4 year: 2016 end-page: 458 article-title: Learning with handoff cost constraint for network selection in heterogeneous wireless networks publication-title: Wireless Commun. Mobile Comput. – volume: 68 start-page: 569 issue: 1 year: 2020 end-page: 581 article-title: Anti‐intelligent UAV jamming strategy via deep q‐networks publication-title: IEEE Trans. Commun. – volume: 17 start-page: 6348 issue: 9 year: 2018 end-page: 6359 article-title: Multiple UAVs as relays: Multi‐hop single link versus multiple dual‐hop links publication-title: IEEE Trans. Wireless Commun. – start-page: 1 year: 2020 end-page: 5 article-title: Energy efficient relay in UAV networks against jamming: A reinforcement learning based approach – volume: 20 start-page: 1991 issue: 10 year: 2016 end-page: 1994 article-title: Bayesian Stackelberg game for antijamming transmission with incomplete information publication-title: IEEE Commun. Lett. – volume: 8 start-page: 4657 issue: 6 year: 2021 end-page: 4667 article-title: Full‐duplex UAV relaying for multiple user pairs publication-title: IEEE Internet Things J. – volume: 16 start-page: 161 year: 2021 end-page: 172 article-title: Enhanced secrecy performance of multihop IOT networks with cooperative hybrid‐duplex jamming publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 67 start-page: 1672 issue: 2 year: 2018 end-page: 1683 article-title: AC‐POCA: Anticoordination game based partially overlapping channels assignment in combined UAV and D2D‐based networks publication-title: IEEE Trans. Veh. Technol. – volume: 70 start-page: 8275 issue: 8 year: 2021 end-page: 8279 article-title: UAV‐enabled relay communication under malicious jamming: Joint trajectory and transmit power optimization publication-title: IEEE Trans. Veh. Technol. – volume: 69 start-page: 3930 issue: 6 year: 2021 end-page: 3942 article-title: A UAV‐enabled data dissemination protocol with proactive caching and file sharing in V2X networks publication-title: IEEE Trans. Commun. – ident: e_1_2_9_39_1 doi: 10.1109/ICCChina.2016.7636793 – ident: e_1_2_9_51_1 doi: 10.1109/TWC.2016.2531652 – ident: e_1_2_9_37_1 doi: 10.1109/WCSP52459.2021.9613616 – ident: e_1_2_9_7_1 doi: 10.1109/LWC.2021.3100113 – ident: e_1_2_9_26_1 doi: 10.1109/TCOMM.2021.3064569 – ident: e_1_2_9_8_1 doi: 10.1049/cmu2.12107 – ident: e_1_2_9_57_1 doi: 10.1002/wcm.2525 – ident: e_1_2_9_41_1 doi: 10.1109/ICNP.2011.6089079 – ident: e_1_2_9_13_1 doi: 10.1109/ACCESS.2018.2867849 – ident: e_1_2_9_14_1 doi: 10.1109/JSAC.2018.2864375 – ident: e_1_2_9_25_1 doi: 10.1109/ACCESS.2019.2907962 – ident: e_1_2_9_9_1 doi: 10.1109/LCOMM.2019.2949274 – ident: e_1_2_9_18_1 doi: 10.1109/VTCSpring.2018.8417733 – ident: e_1_2_9_40_1 doi: 10.1109/TVT.2019.2935999 – ident: e_1_2_9_30_1 doi: 10.1109/TWC.2017.2689005 – ident: e_1_2_9_5_1 doi: 10.1109/MRA.2012.2206473 – ident: e_1_2_9_2_1 doi: 10.1109/COMST.2015.2495297 – ident: e_1_2_9_15_1 doi: 10.1109/TCOMM.2016.2611512 – ident: e_1_2_9_50_1 doi: 10.1109/TGCN.2017.2767203 – ident: e_1_2_9_47_1 doi: 10.2307/1427934 – ident: e_1_2_9_19_1 doi: 10.23919/ICN.2021.0010 – ident: e_1_2_9_23_1 doi: 10.1109/VTC2020-Spring48590.2020.9128716 – ident: e_1_2_9_24_1 doi: 10.1109/TVT.2021.3089158 – ident: e_1_2_9_29_1 doi: 10.1109/JSEN.2019.2958966 – ident: e_1_2_9_55_1 doi: 10.1109/JIOT.2021.3103196 – ident: e_1_2_9_3_1 doi: 10.1109/COMST.2019.2902862 – ident: e_1_2_9_36_1 doi: 10.1109/TCOMM.2019.2947918 – ident: e_1_2_9_35_1 doi: 10.1109/ACCESS.2019.2893459 – ident: e_1_2_9_12_1 doi: 10.1109/WCNC.2018.8377137 – ident: e_1_2_9_44_1 doi: 10.1109/MWC.001.1900280 – ident: e_1_2_9_45_1 doi: 10.1016/0196-8858(85)90002-8 – ident: e_1_2_9_58_1 doi: 10.1109/TMC.2020.3048480 – ident: e_1_2_9_32_1 doi: 10.1109/TVT.2017.2753280 – ident: e_1_2_9_11_1 doi: 10.1109/ACCESS.2019.2946353 – ident: e_1_2_9_22_1 doi: 10.1109/MWC.001.1900207 – ident: e_1_2_9_28_1 doi: 10.1109/VTCSpring.2013.6692490 – ident: e_1_2_9_42_1 doi: 10.1109/ACCESS.2018.2850879 – ident: e_1_2_9_43_1 doi: 10.1109/ICCC51575.2020.9344934 – ident: e_1_2_9_34_1 doi: 10.1109/LCOMM.2016.2598808 – ident: e_1_2_9_38_1 doi: 10.1109/MWC.2019.1800601 – ident: e_1_2_9_46_1 doi: 10.1023/A:1013689704352 – ident: e_1_2_9_31_1 doi: 10.1109/TIFS.2020.3005336 – ident: e_1_2_9_10_1 doi: 10.1109/LCOMM.2018.2800737 – ident: e_1_2_9_56_1 doi: 10.1007/s11276-016-1428-3 – ident: e_1_2_9_48_1 doi: 10.1109/JIOT.2021.3113128 – ident: e_1_2_9_27_1 doi: 10.1109/JIOT.2020.3027621 – ident: e_1_2_9_33_1 doi: 10.1109/LWC.2017.2747543 – ident: e_1_2_9_53_1 doi: 10.1037/h0042769 – ident: e_1_2_9_21_1 doi: 10.1109/TVT.2018.2789466 – ident: e_1_2_9_4_1 doi: 10.1109/MWC.2018.1800023 – ident: e_1_2_9_6_1 doi: 10.1109/JIOT.2019.2903165 – ident: e_1_2_9_20_1 doi: 10.1109/SPAWC.2009.5161790 – ident: e_1_2_9_54_1 doi: 10.1016/j.artint.2010.07.002 – ident: e_1_2_9_17_1 doi: 10.1109/TWC.2018.2859394 – ident: e_1_2_9_52_1 doi: 10.1109/ICC.2019.8761467 – ident: e_1_2_9_16_1 doi: 10.1109/LCOMM.2017.2776215 – ident: e_1_2_9_49_1 doi: 10.1109/LWC.2014.2342736 |
SSID | ssj0055644 |
Score | 2.322306 |
Snippet | Although unmanned aerial vehicle (UAV) relay can provide auxiliary communication due to its flexible mobility, it is vulnerable to jamming attacks. This paper... Abstract Although unmanned aerial vehicle (UAV) relay can provide auxiliary communication due to its flexible mobility, it is vulnerable to jamming attacks.... |
SourceID | doaj proquest crossref wiley |
SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 2467 |
SubjectTerms | Algorithms Cost analysis Costs Distance learning Game theory Jammers Jamming Markov analysis Modal choice Optimization Power Rationality Relay Switching Trajectory optimization Unmanned aerial vehicles Wireless communications |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQJxgQT1EoyBIsIAWS2DExW0FUFRJMFLFZ50dQK1IQLQMbOwu_kV_C2UlQkRAsbIntRNbd-e7z6ztC9myRChw2SSQk8Ihr1IUGSCKbOWaAM-DWLw1cXon-gF_cZrczqb78mbCKHrgS3FHKbZJ46u1YFjxjsY55IWKjmbY2M3nwvhjzmslU5YOzTIQ0rhgbkwgxe94Qk3J5ZMrn9BDDer2Q0oSiwNj_DWbOgtUQbXpLZLGGibRbdW-ZzLnxClmYIQ9cJW-nQ4xAliJcxJEYqKroHZTu4_Vdh4pB94b6qyovFKU3xOIRlCV-Ss3spZDJCQ3n8Ib-_DOdPsEorOO_0Ad0JmV9SxP_YH3deIJm4dfXqM-gQychiQ6-rpFB7_z6rB_VqRUiwzlOP3ObZ2BwdpRKkaBuNFiXG2n9Jh2OSTBgs8RI7jgCOAsOYR16xlxoAYVmgrF10ho_jN0GocbJwkgNCP0S7vJjDa4AgUriTosUWJvsN1JWpuYd9-kv7lXY_-ZSeY2ooJE22f1q-1ixbfzY6tQr66uFZ8gOBWg3qrYb9ZfdtEmnUbWqh-1EsVimKAB0ZG1yENT_SzfU2eUgDU-b_9GhLTKf-qsV4ahMh7SmT89uGwHPVO8E2_4EhcMBSQ priority: 102 providerName: Directory of Open Access Journals – databaseName: ProQuest Databases dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lb9QwELagvcABUR5ioVSW4AJSaGJPTMwFdatWFVIrhFjUmzV-pNqq2S2b7aE37lz4jfwSxq7TbiXUWxI7luXxzHwez4Oxt74VitimKpRGKMASLSxiVfg6SIcgEXw0DRweqYMJfDmuj7PBrc9ulYNMTILaz120kW_LUgtBug3E5_OfRawaFW9XcwmN-2ydRHBDh6_18d7R12-DLK5rlcq5ko6sCsLuzZCgFPS26y7EB1Lv2aAyqKSUuf8W3FwFrUnr7D9mjzJc5DtX9N1g98LsCXu4kkTwKfs9npIm8pxgI3FkSlnFT7ALf3_9salhsvODx5CVS06rOKXPp9h19Ct3q8Eh_See_PGm0Q-aLxd4muz5l3xOQqXL0Zo0go9ts562R7Sz8VhJh_epmA69PmOT_b3vuwdFLrFQOAA6hja-qdHRKUloVRGNLPrQOO3jZR3xJjr0deU0BCAg5zEQvCMJ2SirsLVSSfmcrc3ms_CCcRd067RFgoAVhOajxdCiglZBsEqgHLF3wyobl_OPxzIYZybdg4M2kSImUWTE3lz3Pb_KuvHfXuNIrOseMVN2-jBfnJjMeEaAr6qYur3ULdSytCVNqXRWWu9r19AgmwOpTWbf3txsthF7n8h_xzTM7uFEpKeXd4_1ij0QMXgiOcNssrXl4iK8JkiztFt53_4DG1_6HQ priority: 102 providerName: ProQuest |
Title | Biased Stackelberg game‐based UAV relay anti‐jamming communications: Exploiting trajectory optimization and transmission mode selection |
URI | https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fcmu2.12502 https://www.proquest.com/docview/3092291042 https://doaj.org/article/24d11ca4809f4530b04f60cb3bdd5c82 |
Volume | 16 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Na9tAEF1CckkPpZ_UbWoW0ksLaqXd1VZbeolDnBBICCUOuS2zHwoOlV1s55Bb7730N_aXdGYtOQ6UQi5GllZC7NPMPI123jD2LtRCo9kUmTagMuUQCwdQZKGM0oOSoAKlBk5O9dFIHV-Wlxvsa1cLs9SHWCXcyDKSvyYDB7fsQoKkFkH0zY34iOGZlCS3qLaWlPOFOuv8cFnq1MoV42ORIW-vOnFSZT7dnXsvHCXV_ntUc52wpogzfMIet1SR7y2xfco24uQZe7QmIPic_RqMMQoFjpQRrTHJVfEraOKfn79dOjDau-BUrnLLcQbHuPsamgZP5X69MGT-hae1eGNaA80XM7hOufxbPkWH0rSVmniFQMcmc3w0KMfGqYsOn6dGOvj3BRsND873j7K2vULmlcJX0CpUJXh8QxJGF4iPgxArbwJ9qEO7BA-hLLxRUSGJCxCR2qF3rLTTUDuppXzJNifTSXzFuI-m9sYB0r9Cxeqzg1iDVrVW0WkBssfed7Nsfas9Ti0wvtv0DVwZS4jYhEiP7a7G_lgqbvxz1IDAWo0gley0Yzq7sq3RWaFCUZBse25qVcrc5XhLuXfShVD6Ci-y00FtW9OdW5kbgROAzqzHPiT4_3Mbdv9kJNLW64cMfsO2BZVRpGUxO2xzMbuJb5HcLFw_PcP4Ww0P-2xrcHB69q2fEgV_AbOj_PQ |
linkProvider | Wiley-Blackwell |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaq9gAcUHmJhUItAQeQQhPbMTESQn0tW9rtqYt6c_1KtRXZLZut0N64c-GX8KP4JZ3xJmWRUG-9JbFjWZ7X57FnhpCXvmQSxCZLpDIiERZoYY3JEp8H7ozgRnh0DfQPZW8gPh_nx0vkdxsLg9cqW50YFbUfO_SRb_BUMQa2TbCP598SrBqFp6ttCY05W-yH2XfYstUf9naAvq8Y6-4ebfeSpqpA4oSAnVfhi9w42BgwJTOYljU-FE55PJ8CdjTO-DxzSgQB2MWbAIgGlEIhrTSl5RIdoKDyVwTnCiWq6H5qNX-ey1g8FixylsBOoWjToQq14aoL9hbAROO-aQ1grBPwD7hdhMjRxnVXyd0GnNLNOTfdI0thdJ_cWUhZ-ID83BqC3fMUQCrIf0yQRU9NFf78-GVjw2DzC8UAmRkFmg3h85mpKviVusVQlPo9jbf_hnjrmk4n5iyeHszoGFRY1cSGwgge20Y1MCN69SjW7aF1LN0Drw_J4EaW_hFZHo1H4TGhLqjSKWsAcGYiFO-sCaWRopQiWMkM75DX7Spr12Q7x6IbX3U8dRdKI0V0pEiHvLjqez7P8fHfXltIrKsemJc7fhhPTnUj5poJn2WYKD5Vpch5alOYUuost97nroBB1lpS60ZZ1Pova3fIm0j-a6aht_sDFp-eXD_WOrnVO-of6IO9w_2n5DbDsI14DWeNLE8nF-EZgKmpfR45mJKTmxaZS3LnNOQ |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEB5VqVTBAZUCIlDKSsABJBN7vd56kSrUtI1aSqMKEdTbdl-uUuGkjVOh3Lhz4ffwc_glzG7sEiTUW29-rFcrz-zMN7PzAHhpC8px2yQRF4pFTCMttFJJZDOXGsVSxax3DRz1-f6AfTjJTpbgV5ML48MqG5kYBLUdG-8j76SxoBR1G6Odog6LON7tvb-4jHwHKX_S2rTTmLPIoZt9Q_Ot2jrYRVq_orS393lnP6o7DESGMbTCcptnyqCRQAVPcIlaWZcbYf1ZFbKmMspmiRHMMcQxVjlENyggcq65KnTKvTMUxf_yJlpFcQuWu3v940-NHsgyHlrJon5OIrQb8qY4KhMdU17RtwgtamdOow5D14B_oO4iYA4ar7cK92qoSrbnvHUfltxoDe4uFDB8AD-6Q9SCliBkRWkQymWRM1W6399_6vBisP2F-HSZGUEKDvHxuSpL_JSYxcSU6h0JsYBDH4NNphN1Hs4SZmSMAq2sM0VxBuvfjSpkTe_jI76LD6lCIx-8fQiDW_n5j6A1Go_cYyDGicIIrRB-Jszlm1q5QnFWcOY0pyptw-vmL0tT1z73LTi-ynAGz4T0FJGBIm14cT32Yl7x47-jup5Y1yN8le7wYDw5k_Wml5TZJPFl42NRsCyNdYxLio1OtbWZyXGS9YbUshYdlfzL6G14E8h_wzLkztGAhqsnN8_1HFZwu8iPB_3Dp3CH-hyOEJOzDq3p5Mo9Q2Q11Rs1CxM4ve1d8we_Jzp2 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Biased+Stackelberg+game%E2%80%90based+UAV+relay+anti%E2%80%90jamming+communications%3A+Exploiting+trajectory+optimization+and+transmission+mode+selection&rft.jtitle=IET+communications&rft.au=Su%2C+Zhe&rft.au=Wu%2C+Qihui&rft.au=Qi%2C+Nan&rft.au=Jia%2C+Luliang&rft.date=2022-12-01&rft.issn=1751-8628&rft.eissn=1751-8636&rft.volume=16&rft.issue=20&rft.spage=2467&rft.epage=2478&rft_id=info:doi/10.1049%2Fcmu2.12502&rft.externalDBID=10.1049%252Fcmu2.12502&rft.externalDocID=CMU212502 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8628&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8628&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8628&client=summon |