Biased Stackelberg game‐based UAV relay anti‐jamming communications: Exploiting trajectory optimization and transmission mode selection

Although unmanned aerial vehicle (UAV) relay can provide auxiliary communication due to its flexible mobility, it is vulnerable to jamming attacks. This paper considers the UAV relay anti‐jamming communication issue under the threat of a malicious jammer with beam‐forming jamming capability. To prev...

Full description

Saved in:
Bibliographic Details
Published inIET communications Vol. 16; no. 20; pp. 2467 - 2478
Main Authors Su, Zhe, Wu, Qihui, Qi, Nan, Jia, Luliang, Du, Zhiyong
Format Journal Article
LanguageEnglish
Published Stevenage John Wiley & Sons, Inc 01.12.2022
Wiley
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Although unmanned aerial vehicle (UAV) relay can provide auxiliary communication due to its flexible mobility, it is vulnerable to jamming attacks. This paper considers the UAV relay anti‐jamming communication issue under the threat of a malicious jammer with beam‐forming jamming capability. To prevent the relay link from deteriorating, UAV trajectory adjustment and transmission mode switching between half‐duplex and full‐duplex are two available schemes, while they will incur the additional flying costs and continuous mode switching, respectively. To balance the trade‐off between trajectory optimization and mode selection, this paper investigates the joint trajectory optimization and mode selection anti‐jamming approach. First, an anti‐jamming utility considering the cost‐efficient and end‐to‐end capacity gains is designed. Second, to model the bounded rationality of both the UAV relay and the jammer due to the adversarial context, a biased Stackelberg game to analyse the competitive system interactions is proposed. Moreover, the existence of Stackelberg equilibrium (SE) in the problem is proved. Finally, a joint mode selection and trajectory optimization (JMSTO) algorithm based on the multi‐armed bandit is proposed to obtain the SE. It is further demonstrated that the JMSTO algorithm has a logarithmic regret. The results show that our proposed JMSTO algorithm is superior to non‐joint optimization methods.
AbstractList Although unmanned aerial vehicle (UAV) relay can provide auxiliary communication due to its flexible mobility, it is vulnerable to jamming attacks. This paper considers the UAV relay anti‐jamming communication issue under the threat of a malicious jammer with beam‐forming jamming capability. To prevent the relay link from deteriorating, UAV trajectory adjustment and transmission mode switching between half‐duplex and full‐duplex are two available schemes, while they will incur the additional flying costs and continuous mode switching, respectively. To balance the trade‐off between trajectory optimization and mode selection, this paper investigates the joint trajectory optimization and mode selection anti‐jamming approach. First, an anti‐jamming utility considering the cost‐efficient and end‐to‐end capacity gains is designed. Second, to model the bounded rationality of both the UAV relay and the jammer due to the adversarial context, a biased Stackelberg game to analyse the competitive system interactions is proposed. Moreover, the existence of Stackelberg equilibrium (SE) in the problem is proved. Finally, a joint mode selection and trajectory optimization (JMSTO) algorithm based on the multi‐armed bandit is proposed to obtain the SE. It is further demonstrated that the JMSTO algorithm has a logarithmic regret. The results show that our proposed JMSTO algorithm is superior to non‐joint optimization methods.
Abstract Although unmanned aerial vehicle (UAV) relay can provide auxiliary communication due to its flexible mobility, it is vulnerable to jamming attacks. This paper considers the UAV relay anti‐jamming communication issue under the threat of a malicious jammer with beam‐forming jamming capability. To prevent the relay link from deteriorating, UAV trajectory adjustment and transmission mode switching between half‐duplex and full‐duplex are two available schemes, while they will incur the additional flying costs and continuous mode switching, respectively. To balance the trade‐off between trajectory optimization and mode selection, this paper investigates the joint trajectory optimization and mode selection anti‐jamming approach. First, an anti‐jamming utility considering the cost‐efficient and end‐to‐end capacity gains is designed. Second, to model the bounded rationality of both the UAV relay and the jammer due to the adversarial context, a biased Stackelberg game to analyse the competitive system interactions is proposed. Moreover, the existence of Stackelberg equilibrium (SE) in the problem is proved. Finally, a joint mode selection and trajectory optimization (JMSTO) algorithm based on the multi‐armed bandit is proposed to obtain the SE. It is further demonstrated that the JMSTO algorithm has a logarithmic regret. The results show that our proposed JMSTO algorithm is superior to non‐joint optimization methods.
Although unmanned aerial vehicle (UAV) relay can provide auxiliary communication due to its flexible mobility, it is vulnerable to jamming attacks. This paper considers the UAV relay anti‐jamming communication issue under the threat of a malicious jammer with beam‐forming jamming capability. To prevent the relay link from deteriorating, UAV trajectory adjustment and transmission mode switching between half‐duplex and full‐duplex are two available schemes, while they will incur the additional flying costs and continuous mode switching, respectively. To balance the trade‐off between trajectory optimization and mode selection, this paper investigates the joint trajectory optimization and mode selection anti‐jamming approach. First, an anti‐jamming utility considering the cost‐efficient and end‐to‐end capacity gains is designed. Second, to model the bounded rationality of both the UAV relay and the jammer due to the adversarial context, a biased Stackelberg game to analyse the competitive system interactions is proposed. Moreover, the existence of Stackelberg equilibrium (SE) in the problem is proved. Finally, a joint mode selection and trajectory optimization (JMSTO) algorithm based on the multi‐armed bandit is proposed to obtain the SE. It is further demonstrated that the JMSTO algorithm has a logarithmic regret. The results show that our proposed JMSTO algorithm is superior to non‐joint optimization methods.
Author Su, Zhe
Jia, Luliang
Wu, Qihui
Qi, Nan
Du, Zhiyong
Author_xml – sequence: 1
  givenname: Zhe
  orcidid: 0000-0002-2987-3484
  surname: Su
  fullname: Su, Zhe
  organization: Nanjing University of Aeronautics and Astronautics
– sequence: 2
  givenname: Qihui
  surname: Wu
  fullname: Wu, Qihui
  email: wuqihui2014@sina.com
  organization: Nanjing University of Aeronautics and Astronautics
– sequence: 3
  givenname: Nan
  orcidid: 0000-0002-0125-370X
  surname: Qi
  fullname: Qi, Nan
  organization: Southeast University
– sequence: 4
  givenname: Luliang
  surname: Jia
  fullname: Jia, Luliang
  organization: Space Engineering University
– sequence: 5
  givenname: Zhiyong
  surname: Du
  fullname: Du, Zhiyong
  organization: National University of Defense Technology
BookMark eNp9kc1u1DAUhSNUJPrDhieIxA5piu3YxmZXRm2pVNQFDFvrxnZGDnE82B7BdNU9G56RJ8FJgAVCrGzf-52j63tOqqMxjLaqnmF0jhGVL7Xfk3NMGCKPqmP8iuGV4A0_-nMn4kl1klKPEGOc0uPq2xsHyZr6fQb9yQ6tjdt6C97-ePjezo3Nxcc62gEONYzZlXIP3rtxW-vg_X50GrILY3pdX37dDcHlqZUj9FbnEA912GXn3f0MFQcz9cbkXUpTwQdj62SHApfnWfW4gyHZp7_O02pzdflh_XZ1e3d9s764XWlKCVkJIxhoTCWRHAPgFowVWhqEiMSSgwbDsJbUUoaEAUvLXxsheMuhaxveNKfVzeJrAvRqF52HeFABnJoLIW4VxOz0YBWhBmMNVCDZUdagFtGOI902rTFMC1K8ni9euxg-723Kqg_7OJbxVYMkKRMhOlFooXQMKUXbKe3yvJOyDjcojNQUn5riU3N8RfLiL8nvQf8J4wX-4gZ7-A-p1u82ZNH8BKSQsRM
CitedBy_id crossref_primary_10_3390_electronics12204344
Cites_doi 10.1109/ICCChina.2016.7636793
10.1109/TWC.2016.2531652
10.1109/WCSP52459.2021.9613616
10.1109/LWC.2021.3100113
10.1109/TCOMM.2021.3064569
10.1049/cmu2.12107
10.1002/wcm.2525
10.1109/ICNP.2011.6089079
10.1109/ACCESS.2018.2867849
10.1109/JSAC.2018.2864375
10.1109/ACCESS.2019.2907962
10.1109/LCOMM.2019.2949274
10.1109/VTCSpring.2018.8417733
10.1109/TVT.2019.2935999
10.1109/TWC.2017.2689005
10.1109/MRA.2012.2206473
10.1109/COMST.2015.2495297
10.1109/TCOMM.2016.2611512
10.1109/TGCN.2017.2767203
10.2307/1427934
10.23919/ICN.2021.0010
10.1109/VTC2020-Spring48590.2020.9128716
10.1109/TVT.2021.3089158
10.1109/JSEN.2019.2958966
10.1109/JIOT.2021.3103196
10.1109/COMST.2019.2902862
10.1109/TCOMM.2019.2947918
10.1109/ACCESS.2019.2893459
10.1109/WCNC.2018.8377137
10.1109/MWC.001.1900280
10.1016/0196-8858(85)90002-8
10.1109/TMC.2020.3048480
10.1109/TVT.2017.2753280
10.1109/ACCESS.2019.2946353
10.1109/MWC.001.1900207
10.1109/VTCSpring.2013.6692490
10.1109/ACCESS.2018.2850879
10.1109/ICCC51575.2020.9344934
10.1109/LCOMM.2016.2598808
10.1109/MWC.2019.1800601
10.1023/A:1013689704352
10.1109/TIFS.2020.3005336
10.1109/LCOMM.2018.2800737
10.1007/s11276-016-1428-3
10.1109/JIOT.2021.3113128
10.1109/JIOT.2020.3027621
10.1109/LWC.2017.2747543
10.1037/h0042769
10.1109/TVT.2018.2789466
10.1109/MWC.2018.1800023
10.1109/JIOT.2019.2903165
10.1109/SPAWC.2009.5161790
10.1016/j.artint.2010.07.002
10.1109/TWC.2018.2859394
10.1109/ICC.2019.8761467
10.1109/LCOMM.2017.2776215
10.1109/LWC.2014.2342736
ContentType Journal Article
Copyright 2022 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology.
2022. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the "License"). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2022 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology.
– notice: 2022. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the "License"). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID 24P
AAYXX
CITATION
8FE
8FG
ABJCF
AFKRA
ARAPS
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
L6V
M7S
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
S0W
DOA
DOI 10.1049/cmu2.12502
DatabaseName Wiley Open Access (UHCL Subscription)
CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Databases
Technology Collection
ProQuest One Community College
ProQuest Central Korea
SciTech Premium Collection
ProQuest Engineering Collection
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
DELNET Engineering & Technology Collection
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Advanced Technologies & Aerospace Collection
Engineering Database
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest One Academic Eastern Edition
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
Advanced Technologies & Aerospace Database
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest DELNET Engineering and Technology Collection
Materials Science & Engineering Collection
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
Engineering Collection
DatabaseTitleList CrossRef


Advanced Technologies & Aerospace Collection
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: 24P
  name: Wiley Online Library Open Access
  url: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  sourceTypes: Publisher
– sequence: 3
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1751-8636
EndPage 2478
ExternalDocumentID oai_doaj_org_article_24d11ca4809f4530b04f60cb3bdd5c82
10_1049_cmu2_12502
CMU212502
Genre article
GrantInformation_xml – fundername: Fundamental Research Funds for the Central Universities
  funderid: NT2021017
– fundername: National Natural Science Foundation of China
  funderid: 61827801; 61801218; 61901523; 62031012; 62271253; 62071223
– fundername: National Key R&D Program of China
  funderid: 2018YFB1800800
– fundername: National Natural Science Foundation of China under Key Project
  funderid: 61931011
GroupedDBID .DC
0R~
0ZK
1OC
24P
29I
2QL
4.4
4IJ
5GY
6IK
6OB
8FE
8FG
8VB
96U
AAHHS
AAHJG
AAJGR
ABJCF
ABQXS
ACCFJ
ACCMX
ACESK
ACGFO
ACGFS
ACIWK
ACXQS
ADEYR
AEEZP
AEGXH
AENEX
AEQDE
AFAZI
AFKRA
AIAGR
AIWBW
AJBDE
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ARAPS
AVUZU
BENPR
BGLVJ
CCPQU
CS3
DU5
EBS
EJD
ESX
F8P
GOZPB
GROUPED_DOAJ
GRPMH
HCIFZ
HZ~
IAO
IFIPE
IPLJI
ITC
JAVBF
K1G
L6V
LAI
M43
M7S
MCNEO
MS~
NADUK
NXXTH
O9-
OCL
OK1
P62
PTHSS
QWB
RIE
RNS
ROL
RUI
S0W
U5U
UNMZH
ZL0
~ZZ
AAYXX
CITATION
IDLOA
PHGZM
PHGZT
DWQXO
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
WIN
PUEGO
ID FETCH-LOGICAL-c4422-8d85ac1492961aa1bade8c9d0029196acad51c94e4508dae40553886b6afb3633
IEDL.DBID 24P
ISSN 1751-8628
IngestDate Wed Aug 27 01:31:24 EDT 2025
Wed Aug 13 09:27:03 EDT 2025
Tue Jul 01 05:15:51 EDT 2025
Thu Apr 24 22:54:54 EDT 2025
Wed Jan 22 16:21:09 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 20
Language English
License Attribution-NonCommercial-NoDerivs
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c4422-8d85ac1492961aa1bade8c9d0029196acad51c94e4508dae40553886b6afb3633
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-2987-3484
0000-0002-0125-370X
OpenAccessLink https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fcmu2.12502
PQID 3092291042
PQPubID 1936360
PageCount 12
ParticipantIDs doaj_primary_oai_doaj_org_article_24d11ca4809f4530b04f60cb3bdd5c82
proquest_journals_3092291042
crossref_citationtrail_10_1049_cmu2_12502
crossref_primary_10_1049_cmu2_12502
wiley_primary_10_1049_cmu2_12502_CMU212502
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate December 2022
2022-12-00
20221201
2022-12-01
PublicationDateYYYYMMDD 2022-12-01
PublicationDate_xml – month: 12
  year: 2022
  text: December 2022
PublicationDecade 2020
PublicationPlace Stevenage
PublicationPlace_xml – name: Stevenage
PublicationTitle IET communications
PublicationYear 2022
Publisher John Wiley & Sons, Inc
Wiley
Publisher_xml – name: John Wiley & Sons, Inc
– name: Wiley
References 2021; 69
2019; 7
2021; 8
2017; 6
2019; 6
2021; 2
2020; 20
2011
1985; 6
2009
2012; 19
2022; 21
2016; 18
2018; 67
2018; 22
2016; 16
2016; 15
2021; 70
2018; 24
2018; 6
2021; 16
2002; 47
2021; 15
2018; 17
2021; 10
2018; 2
2014; 3
1995; 27
2021
1956; 63
2019; 21
2020
2017; 16
2019; 68
2019; 26
2022; 9
2016; 64
2020; 27
2016; 20
2019
2018
2010; 174
2020; 24
2020; 68
2016
2013
2018; 36
e_1_2_9_31_1
e_1_2_9_52_1
e_1_2_9_50_1
e_1_2_9_10_1
e_1_2_9_35_1
e_1_2_9_56_1
e_1_2_9_12_1
e_1_2_9_33_1
e_1_2_9_54_1
e_1_2_9_14_1
e_1_2_9_39_1
e_1_2_9_16_1
e_1_2_9_37_1
e_1_2_9_58_1
e_1_2_9_18_1
e_1_2_9_41_1
e_1_2_9_20_1
e_1_2_9_22_1
e_1_2_9_45_1
e_1_2_9_24_1
e_1_2_9_43_1
e_1_2_9_8_1
e_1_2_9_6_1
e_1_2_9_4_1
e_1_2_9_2_1
e_1_2_9_26_1
e_1_2_9_49_1
e_1_2_9_28_1
e_1_2_9_47_1
e_1_2_9_30_1
e_1_2_9_53_1
e_1_2_9_51_1
e_1_2_9_11_1
e_1_2_9_34_1
e_1_2_9_57_1
e_1_2_9_13_1
e_1_2_9_32_1
e_1_2_9_55_1
e_1_2_9_15_1
e_1_2_9_38_1
e_1_2_9_17_1
e_1_2_9_36_1
e_1_2_9_19_1
e_1_2_9_42_1
e_1_2_9_40_1
e_1_2_9_21_1
e_1_2_9_46_1
e_1_2_9_23_1
e_1_2_9_44_1
e_1_2_9_7_1
e_1_2_9_5_1
e_1_2_9_3_1
e_1_2_9_9_1
e_1_2_9_25_1
e_1_2_9_27_1
e_1_2_9_48_1
e_1_2_9_29_1
References_xml – volume: 6
  start-page: 48688
  year: 2018
  end-page: 48696
  article-title: Power and trajectory optimization for UAV‐enabled amplify‐and‐forward relay networks
  publication-title: IEEE Access
– volume: 36
  start-page: 1986
  issue: 9
  year: 2018
  end-page: 1999
  article-title: Spectrum sharing planning for full‐duplex UAV relaying systems with underlaid D2D communications
  publication-title: IEEE J. Sel. Areas Commun.
– volume: 9
  start-page: 6434
  issue: 9
  year: 2022
  end-page: 6442
  article-title: Multiagent Q‐learning‐based multi‐UAV wireless networks for maximizing energy efficiency: Deployment and power control strategy design
  publication-title: IEEE Internet Things J.
– volume: 15
  start-page: 1262
  issue: 10
  year: 2021
  end-page: 1272
  article-title: A survey on unmanned aerial vehicle relaying networks
  publication-title: IET Commun.
– start-page: 1
  year: 2018
  end-page: 6
  article-title: Deployment of multi‐layer UAV relay system
– volume: 27
  start-page: 1054
  issue: 4
  year: 1995
  end-page: 1078
  article-title: Sample mean based index policies by O (log n) regret for the multi‐armed bandit problem
  publication-title: Adv. Appl. Probab.
– volume: 21
  start-page: 2334
  issue: 3
  year: 2019
  end-page: 2360
  article-title: A tutorial on UAVs for wireless networks: Applications, challenges, and open problems
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 19
  start-page: 46
  issue: 3
  year: 2012
  end-page: 56
  article-title: Toward a fully autonomous UAV: Research platform for indoor and outdoor urban search and rescue
  publication-title: IEEE Robot. Autom. Mag.
– volume: 24
  start-page: 155
  issue: 1
  year: 2020
  end-page: 158
  article-title: Optimal placement of UAV‐assisted free‐space optical communication systems with DF relaying
  publication-title: IEEE Commun. Lett.
– volume: 26
  start-page: 93
  issue: 2
  year: 2019
  end-page: 99
  article-title: Deep learning in physical layer communications
  publication-title: IEEE Wireless Commun.
– volume: 7
  start-page: 14623
  year: 2019
  end-page: 14636
  article-title: Power control in relay‐assisted anti‐jamming systems: A Bayesian three‐layer Stackelberg game approach
  publication-title: IEEE Access
– volume: 6
  start-page: 818
  issue: 6
  year: 2017
  end-page: 821
  article-title: A hierarchical learning solution for anti‐jamming Stackelberg game with discrete power strategies
  publication-title: IEEE Wireless Commun. Lett.
– volume: 63
  start-page: 129
  issue: 2
  year: 1956
  article-title: Rational choice and the structure of the environment
  publication-title: Psychol. Rev.
– volume: 22
  start-page: 248
  issue: 2
  year: 2018
  end-page: 251
  article-title: Optimum placement of UAV as relays
  publication-title: IEEE Commun. Lett.
– volume: 15
  start-page: 3949
  issue: 6
  year: 2016
  end-page: 3963
  article-title: Unmanned aerial vehicle with underlaid device‐to‐device communications: Performance and tradeoffs
  publication-title: IEEE Trans. Wireless Commun.
– volume: 2
  start-page: 150
  issue: 2
  year: 2021
  end-page: 162
  article-title: Distributed reinforcement learning based framework for energy‐efficient UAV relay against jamming
  publication-title: Intell. Converged Networks
– volume: 9
  start-page: 4356
  issue: 6
  year: 2022
  end-page: 4370
  article-title: Intelligent jamming defense using DNN Stackelberg game in sensor edge cloud
  publication-title: IEEE Internet Things J.
– volume: 27
  start-page: 48
  issue: 4
  year: 2020
  end-page: 53
  article-title: UAV‐aided cellular communications with deep reinforcement learning against jamming
  publication-title: IEEE Wireless Commun.
– volume: 7
  start-page: 147732
  year: 2019
  end-page: 147742
  article-title: Throughput improvement for multi‐hop UAV relaying
  publication-title: IEEE Access
– volume: 24
  start-page: 1683
  issue: 5
  year: 2018
  end-page: 1697
  article-title: Opportunistic channel access with repetition time diversity and switching cost: A block multi‐armed bandit approach
  publication-title: Wirel. Netw.
– start-page: 275
  year: 2009
  end-page: 279
  article-title: On the feasibility of full‐duplex relaying in the presence of loop interference
– volume: 20
  start-page: 3930
  issue: 7
  year: 2020
  end-page: 3945
  article-title: Joint resource allocation and transmission mode selection using a POMDP‐based hybrid half‐duplex/full‐duplex scheme for secrecy rate maximization in multi‐channel cognitive radio networks
  publication-title: IEEE Sens. J.
– volume: 3
  start-page: 569
  issue: 6
  year: 2014
  end-page: 572
  article-title: Optimal lap altitude for maximum coverage
  publication-title: IEEE Wireless Commun. Lett.
– volume: 26
  start-page: 120
  issue: 1
  year: 2019
  end-page: 127
  article-title: Cellular‐connected UAV: Potential, challenges, and promising technologies
  publication-title: IEEE Wireless Commun.
– volume: 7
  start-page: 40913
  year: 2019
  end-page: 40924
  article-title: UAV relay flight path planning in the presence of jamming signal
  publication-title: IEEE Access
– volume: 2
  start-page: 14
  issue: 1
  year: 2018
  end-page: 24
  article-title: Resource allocation for energy harvesting‐powered D2D communication underlaying UAV‐assisted networks
  publication-title: IEEE Trans. Green Commun. Networking
– volume: 6
  start-page: 4
  issue: 1
  year: 1985
  end-page: 22
  article-title: Asymptotically efficient adaptive allocation rules
  publication-title: Adv. Appl. Math.
– volume: 6
  start-page: 40177
  year: 2018
  end-page: 40188
  article-title: A multi‐domain anti‐jamming defense scheme in heterogeneous wireless networks
  publication-title: IEEE Access
– start-page: 1
  year: 2013
  end-page: 5
  article-title: Cooperative communications against jamming with half‐duplex and full‐duplex relaying
– start-page: 1
  year: 2016
  end-page: 5
  article-title: Reinforcement learning based anti‐jamming with wideband autonomous cognitive radios
– volume: 47
  start-page: 235
  issue: 2
  year: 2002
  end-page: 256
  article-title: Finite‐time analysis of the multiarmed bandit problem
  publication-title: Mach. Learn.
– volume: 22
  start-page: 808
  issue: 4
  year: 2018
  end-page: 811
  article-title: Optimal node placement and resource allocation for UAV relaying network
  publication-title: IEEE Commun. Lett.
– volume: 68
  start-page: 9920
  issue: 10
  year: 2019
  end-page: 9934
  article-title: Cognitive risk control for anti‐jamming V2V communications in autonomous vehicle networks
  publication-title: IEEE Trans. Veh. Technol.
– start-page: 1
  year: 2018
  end-page: 5
  article-title: Using multiple UAVs as relays for reliable communications
– volume: 18
  start-page: 1123
  issue: 2
  year: 2016
  end-page: 1152
  article-title: Survey of important issues in UAV communication networks
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 64
  start-page: 4983
  issue: 12
  year: 2016
  end-page: 4996
  article-title: Throughput maximization for UAV‐enabled mobile relaying systems
  publication-title: IEEE Trans. Commun.
– start-page: 393
  year: 2011
  end-page: 402
  article-title: Anti‐jamming communication in cognitive radio networks with unknown channel statistics
– volume: 16
  start-page: 3827
  issue: 6
  year: 2017
  end-page: 3839
  article-title: Physical layer security in wireless ad hoc networks under a hybrid full‐/half‐duplex receiver deployment strategy
  publication-title: IEEE Trans. Wireless Commun.
– volume: 174
  start-page: 1142
  issue: 15
  year: 2010
  end-page: 1171
  article-title: Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition
  publication-title: Artif. Intell.
– start-page: 1
  year: 2019
  end-page: 5
  article-title: Joint power and trajectory optimization in UAV anti‐jamming communication networks
– volume: 21
  start-page: 2861
  issue: 8
  year: 2022
  end-page: 2875
  article-title: Joint channel and link selection in formation‐keeping UAV networks: A two‐way consensus game
  publication-title: IEEE Trans. Mob. Comput.
– volume: 6
  start-page: 5508
  issue: 3
  year: 2019
  end-page: 5519
  article-title: DSF‐NOMA: UAV‐assisted emergency communication technology in a heterogeneous internet of things
  publication-title: IEEE Internet Things J.
– volume: 67
  start-page: 4087
  issue: 5
  year: 2018
  end-page: 4097
  article-title: UAV relay in VANETs against smart jamming with reinforcement learning
  publication-title: IEEE Trans. Veh. Technol.
– volume: 27
  start-page: 24
  issue: 1
  year: 2020
  end-page: 30
  article-title: Multi‐armed‐bandit‐based spectrum scheduling algorithms in wireless networks: A survey
  publication-title: IEEE Wireless Commun.
– start-page: 1
  year: 2021
  end-page: 6
  article-title: UAV‐aided anti‐jamming maritime communications: A deep reinforcement learning approach
– start-page: 267
  year: 2020
  end-page: 272
  article-title: A MAB‐based discrete power control approach in anti‐jamming relay communication via three‐layer Stackelberg game
– volume: 10
  start-page: 2350
  issue: 11
  year: 2021
  end-page: 2354
  article-title: A multi‐leader multi‐follower Stackelberg game for coalition‐based UAV MEC networks
  publication-title: IEEE Wireless Commun. Lett.
– volume: 16
  start-page: 441
  issue: 4
  year: 2016
  end-page: 458
  article-title: Learning with handoff cost constraint for network selection in heterogeneous wireless networks
  publication-title: Wireless Commun. Mobile Comput.
– volume: 68
  start-page: 569
  issue: 1
  year: 2020
  end-page: 581
  article-title: Anti‐intelligent UAV jamming strategy via deep q‐networks
  publication-title: IEEE Trans. Commun.
– volume: 17
  start-page: 6348
  issue: 9
  year: 2018
  end-page: 6359
  article-title: Multiple UAVs as relays: Multi‐hop single link versus multiple dual‐hop links
  publication-title: IEEE Trans. Wireless Commun.
– start-page: 1
  year: 2020
  end-page: 5
  article-title: Energy efficient relay in UAV networks against jamming: A reinforcement learning based approach
– volume: 20
  start-page: 1991
  issue: 10
  year: 2016
  end-page: 1994
  article-title: Bayesian Stackelberg game for antijamming transmission with incomplete information
  publication-title: IEEE Commun. Lett.
– volume: 8
  start-page: 4657
  issue: 6
  year: 2021
  end-page: 4667
  article-title: Full‐duplex UAV relaying for multiple user pairs
  publication-title: IEEE Internet Things J.
– volume: 16
  start-page: 161
  year: 2021
  end-page: 172
  article-title: Enhanced secrecy performance of multihop IOT networks with cooperative hybrid‐duplex jamming
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 67
  start-page: 1672
  issue: 2
  year: 2018
  end-page: 1683
  article-title: AC‐POCA: Anticoordination game based partially overlapping channels assignment in combined UAV and D2D‐based networks
  publication-title: IEEE Trans. Veh. Technol.
– volume: 70
  start-page: 8275
  issue: 8
  year: 2021
  end-page: 8279
  article-title: UAV‐enabled relay communication under malicious jamming: Joint trajectory and transmit power optimization
  publication-title: IEEE Trans. Veh. Technol.
– volume: 69
  start-page: 3930
  issue: 6
  year: 2021
  end-page: 3942
  article-title: A UAV‐enabled data dissemination protocol with proactive caching and file sharing in V2X networks
  publication-title: IEEE Trans. Commun.
– ident: e_1_2_9_39_1
  doi: 10.1109/ICCChina.2016.7636793
– ident: e_1_2_9_51_1
  doi: 10.1109/TWC.2016.2531652
– ident: e_1_2_9_37_1
  doi: 10.1109/WCSP52459.2021.9613616
– ident: e_1_2_9_7_1
  doi: 10.1109/LWC.2021.3100113
– ident: e_1_2_9_26_1
  doi: 10.1109/TCOMM.2021.3064569
– ident: e_1_2_9_8_1
  doi: 10.1049/cmu2.12107
– ident: e_1_2_9_57_1
  doi: 10.1002/wcm.2525
– ident: e_1_2_9_41_1
  doi: 10.1109/ICNP.2011.6089079
– ident: e_1_2_9_13_1
  doi: 10.1109/ACCESS.2018.2867849
– ident: e_1_2_9_14_1
  doi: 10.1109/JSAC.2018.2864375
– ident: e_1_2_9_25_1
  doi: 10.1109/ACCESS.2019.2907962
– ident: e_1_2_9_9_1
  doi: 10.1109/LCOMM.2019.2949274
– ident: e_1_2_9_18_1
  doi: 10.1109/VTCSpring.2018.8417733
– ident: e_1_2_9_40_1
  doi: 10.1109/TVT.2019.2935999
– ident: e_1_2_9_30_1
  doi: 10.1109/TWC.2017.2689005
– ident: e_1_2_9_5_1
  doi: 10.1109/MRA.2012.2206473
– ident: e_1_2_9_2_1
  doi: 10.1109/COMST.2015.2495297
– ident: e_1_2_9_15_1
  doi: 10.1109/TCOMM.2016.2611512
– ident: e_1_2_9_50_1
  doi: 10.1109/TGCN.2017.2767203
– ident: e_1_2_9_47_1
  doi: 10.2307/1427934
– ident: e_1_2_9_19_1
  doi: 10.23919/ICN.2021.0010
– ident: e_1_2_9_23_1
  doi: 10.1109/VTC2020-Spring48590.2020.9128716
– ident: e_1_2_9_24_1
  doi: 10.1109/TVT.2021.3089158
– ident: e_1_2_9_29_1
  doi: 10.1109/JSEN.2019.2958966
– ident: e_1_2_9_55_1
  doi: 10.1109/JIOT.2021.3103196
– ident: e_1_2_9_3_1
  doi: 10.1109/COMST.2019.2902862
– ident: e_1_2_9_36_1
  doi: 10.1109/TCOMM.2019.2947918
– ident: e_1_2_9_35_1
  doi: 10.1109/ACCESS.2019.2893459
– ident: e_1_2_9_12_1
  doi: 10.1109/WCNC.2018.8377137
– ident: e_1_2_9_44_1
  doi: 10.1109/MWC.001.1900280
– ident: e_1_2_9_45_1
  doi: 10.1016/0196-8858(85)90002-8
– ident: e_1_2_9_58_1
  doi: 10.1109/TMC.2020.3048480
– ident: e_1_2_9_32_1
  doi: 10.1109/TVT.2017.2753280
– ident: e_1_2_9_11_1
  doi: 10.1109/ACCESS.2019.2946353
– ident: e_1_2_9_22_1
  doi: 10.1109/MWC.001.1900207
– ident: e_1_2_9_28_1
  doi: 10.1109/VTCSpring.2013.6692490
– ident: e_1_2_9_42_1
  doi: 10.1109/ACCESS.2018.2850879
– ident: e_1_2_9_43_1
  doi: 10.1109/ICCC51575.2020.9344934
– ident: e_1_2_9_34_1
  doi: 10.1109/LCOMM.2016.2598808
– ident: e_1_2_9_38_1
  doi: 10.1109/MWC.2019.1800601
– ident: e_1_2_9_46_1
  doi: 10.1023/A:1013689704352
– ident: e_1_2_9_31_1
  doi: 10.1109/TIFS.2020.3005336
– ident: e_1_2_9_10_1
  doi: 10.1109/LCOMM.2018.2800737
– ident: e_1_2_9_56_1
  doi: 10.1007/s11276-016-1428-3
– ident: e_1_2_9_48_1
  doi: 10.1109/JIOT.2021.3113128
– ident: e_1_2_9_27_1
  doi: 10.1109/JIOT.2020.3027621
– ident: e_1_2_9_33_1
  doi: 10.1109/LWC.2017.2747543
– ident: e_1_2_9_53_1
  doi: 10.1037/h0042769
– ident: e_1_2_9_21_1
  doi: 10.1109/TVT.2018.2789466
– ident: e_1_2_9_4_1
  doi: 10.1109/MWC.2018.1800023
– ident: e_1_2_9_6_1
  doi: 10.1109/JIOT.2019.2903165
– ident: e_1_2_9_20_1
  doi: 10.1109/SPAWC.2009.5161790
– ident: e_1_2_9_54_1
  doi: 10.1016/j.artint.2010.07.002
– ident: e_1_2_9_17_1
  doi: 10.1109/TWC.2018.2859394
– ident: e_1_2_9_52_1
  doi: 10.1109/ICC.2019.8761467
– ident: e_1_2_9_16_1
  doi: 10.1109/LCOMM.2017.2776215
– ident: e_1_2_9_49_1
  doi: 10.1109/LWC.2014.2342736
SSID ssj0055644
Score 2.322306
Snippet Although unmanned aerial vehicle (UAV) relay can provide auxiliary communication due to its flexible mobility, it is vulnerable to jamming attacks. This paper...
Abstract Although unmanned aerial vehicle (UAV) relay can provide auxiliary communication due to its flexible mobility, it is vulnerable to jamming attacks....
SourceID doaj
proquest
crossref
wiley
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2467
SubjectTerms Algorithms
Cost analysis
Costs
Distance learning
Game theory
Jammers
Jamming
Markov analysis
Modal choice
Optimization
Power
Rationality
Relay
Switching
Trajectory optimization
Unmanned aerial vehicles
Wireless communications
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQJxgQT1EoyBIsIAWS2DExW0FUFRJMFLFZ50dQK1IQLQMbOwu_kV_C2UlQkRAsbIntRNbd-e7z6ztC9myRChw2SSQk8Ihr1IUGSCKbOWaAM-DWLw1cXon-gF_cZrczqb78mbCKHrgS3FHKbZJ46u1YFjxjsY55IWKjmbY2M3nwvhjzmslU5YOzTIQ0rhgbkwgxe94Qk3J5ZMrn9BDDer2Q0oSiwNj_DWbOgtUQbXpLZLGGibRbdW-ZzLnxClmYIQ9cJW-nQ4xAliJcxJEYqKroHZTu4_Vdh4pB94b6qyovFKU3xOIRlCV-Ss3spZDJCQ3n8Ib-_DOdPsEorOO_0Ad0JmV9SxP_YH3deIJm4dfXqM-gQychiQ6-rpFB7_z6rB_VqRUiwzlOP3ObZ2BwdpRKkaBuNFiXG2n9Jh2OSTBgs8RI7jgCOAsOYR16xlxoAYVmgrF10ho_jN0GocbJwkgNCP0S7vJjDa4AgUriTosUWJvsN1JWpuYd9-kv7lXY_-ZSeY2ooJE22f1q-1ixbfzY6tQr66uFZ8gOBWg3qrYb9ZfdtEmnUbWqh-1EsVimKAB0ZG1yENT_SzfU2eUgDU-b_9GhLTKf-qsV4ahMh7SmT89uGwHPVO8E2_4EhcMBSQ
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: ProQuest Databases
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lb9QwELagvcABUR5ioVSW4AJSaGJPTMwFdatWFVIrhFjUmzV-pNqq2S2b7aE37lz4jfwSxq7TbiXUWxI7luXxzHwez4Oxt74VitimKpRGKMASLSxiVfg6SIcgEXw0DRweqYMJfDmuj7PBrc9ulYNMTILaz120kW_LUgtBug3E5_OfRawaFW9XcwmN-2ydRHBDh6_18d7R12-DLK5rlcq5ko6sCsLuzZCgFPS26y7EB1Lv2aAyqKSUuf8W3FwFrUnr7D9mjzJc5DtX9N1g98LsCXu4kkTwKfs9npIm8pxgI3FkSlnFT7ALf3_9salhsvODx5CVS06rOKXPp9h19Ct3q8Eh_See_PGm0Q-aLxd4muz5l3xOQqXL0Zo0go9ts562R7Sz8VhJh_epmA69PmOT_b3vuwdFLrFQOAA6hja-qdHRKUloVRGNLPrQOO3jZR3xJjr0deU0BCAg5zEQvCMJ2SirsLVSSfmcrc3ms_CCcRd067RFgoAVhOajxdCiglZBsEqgHLF3wyobl_OPxzIYZybdg4M2kSImUWTE3lz3Pb_KuvHfXuNIrOseMVN2-jBfnJjMeEaAr6qYur3ULdSytCVNqXRWWu9r19AgmwOpTWbf3txsthF7n8h_xzTM7uFEpKeXd4_1ij0QMXgiOcNssrXl4iK8JkiztFt53_4DG1_6HQ
  priority: 102
  providerName: ProQuest
Title Biased Stackelberg game‐based UAV relay anti‐jamming communications: Exploiting trajectory optimization and transmission mode selection
URI https://onlinelibrary.wiley.com/doi/abs/10.1049%2Fcmu2.12502
https://www.proquest.com/docview/3092291042
https://doaj.org/article/24d11ca4809f4530b04f60cb3bdd5c82
Volume 16
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Na9tAEF1CckkPpZ_UbWoW0ksLaqXd1VZbeolDnBBICCUOuS2zHwoOlV1s55Bb7730N_aXdGYtOQ6UQi5GllZC7NPMPI123jD2LtRCo9kUmTagMuUQCwdQZKGM0oOSoAKlBk5O9dFIHV-Wlxvsa1cLs9SHWCXcyDKSvyYDB7fsQoKkFkH0zY34iOGZlCS3qLaWlPOFOuv8cFnq1MoV42ORIW-vOnFSZT7dnXsvHCXV_ntUc52wpogzfMIet1SR7y2xfco24uQZe7QmIPic_RqMMQoFjpQRrTHJVfEraOKfn79dOjDau-BUrnLLcQbHuPsamgZP5X69MGT-hae1eGNaA80XM7hOufxbPkWH0rSVmniFQMcmc3w0KMfGqYsOn6dGOvj3BRsND873j7K2vULmlcJX0CpUJXh8QxJGF4iPgxArbwJ9qEO7BA-hLLxRUSGJCxCR2qF3rLTTUDuppXzJNifTSXzFuI-m9sYB0r9Cxeqzg1iDVrVW0WkBssfed7Nsfas9Ti0wvtv0DVwZS4jYhEiP7a7G_lgqbvxz1IDAWo0gley0Yzq7sq3RWaFCUZBse25qVcrc5XhLuXfShVD6Ci-y00FtW9OdW5kbgROAzqzHPiT4_3Mbdv9kJNLW64cMfsO2BZVRpGUxO2xzMbuJb5HcLFw_PcP4Ww0P-2xrcHB69q2fEgV_AbOj_PQ
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaq9gAcUHmJhUItAQeQQhPbMTESQn0tW9rtqYt6c_1KtRXZLZut0N64c-GX8KP4JZ3xJmWRUG-9JbFjWZ7X57FnhpCXvmQSxCZLpDIiERZoYY3JEp8H7ozgRnh0DfQPZW8gPh_nx0vkdxsLg9cqW50YFbUfO_SRb_BUMQa2TbCP598SrBqFp6ttCY05W-yH2XfYstUf9naAvq8Y6-4ebfeSpqpA4oSAnVfhi9w42BgwJTOYljU-FE55PJ8CdjTO-DxzSgQB2MWbAIgGlEIhrTSl5RIdoKDyVwTnCiWq6H5qNX-ey1g8FixylsBOoWjToQq14aoL9hbAROO-aQ1grBPwD7hdhMjRxnVXyd0GnNLNOTfdI0thdJ_cWUhZ-ID83BqC3fMUQCrIf0yQRU9NFf78-GVjw2DzC8UAmRkFmg3h85mpKviVusVQlPo9jbf_hnjrmk4n5iyeHszoGFRY1cSGwgge20Y1MCN69SjW7aF1LN0Drw_J4EaW_hFZHo1H4TGhLqjSKWsAcGYiFO-sCaWRopQiWMkM75DX7Spr12Q7x6IbX3U8dRdKI0V0pEiHvLjqez7P8fHfXltIrKsemJc7fhhPTnUj5poJn2WYKD5Vpch5alOYUuost97nroBB1lpS60ZZ1Pova3fIm0j-a6aht_sDFp-eXD_WOrnVO-of6IO9w_2n5DbDsI14DWeNLE8nF-EZgKmpfR45mJKTmxaZS3LnNOQ
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEB5VqVTBAZUCIlDKSsABJBN7vd56kSrUtI1aSqMKEdTbdl-uUuGkjVOh3Lhz4ffwc_glzG7sEiTUW29-rFcrz-zMN7PzAHhpC8px2yQRF4pFTCMttFJJZDOXGsVSxax3DRz1-f6AfTjJTpbgV5ML48MqG5kYBLUdG-8j76SxoBR1G6Odog6LON7tvb-4jHwHKX_S2rTTmLPIoZt9Q_Ot2jrYRVq_orS393lnP6o7DESGMbTCcptnyqCRQAVPcIlaWZcbYf1ZFbKmMspmiRHMMcQxVjlENyggcq65KnTKvTMUxf_yJlpFcQuWu3v940-NHsgyHlrJon5OIrQb8qY4KhMdU17RtwgtamdOow5D14B_oO4iYA4ar7cK92qoSrbnvHUfltxoDe4uFDB8AD-6Q9SCliBkRWkQymWRM1W6399_6vBisP2F-HSZGUEKDvHxuSpL_JSYxcSU6h0JsYBDH4NNphN1Hs4SZmSMAq2sM0VxBuvfjSpkTe_jI76LD6lCIx-8fQiDW_n5j6A1Go_cYyDGicIIrRB-Jszlm1q5QnFWcOY0pyptw-vmL0tT1z73LTi-ynAGz4T0FJGBIm14cT32Yl7x47-jup5Y1yN8le7wYDw5k_Wml5TZJPFl42NRsCyNdYxLio1OtbWZyXGS9YbUshYdlfzL6G14E8h_wzLkztGAhqsnN8_1HFZwu8iPB_3Dp3CH-hyOEJOzDq3p5Mo9Q2Q11Rs1CxM4ve1d8we_Jzp2
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Biased+Stackelberg+game%E2%80%90based+UAV+relay+anti%E2%80%90jamming+communications%3A+Exploiting+trajectory+optimization+and+transmission+mode+selection&rft.jtitle=IET+communications&rft.au=Su%2C+Zhe&rft.au=Wu%2C+Qihui&rft.au=Qi%2C+Nan&rft.au=Jia%2C+Luliang&rft.date=2022-12-01&rft.issn=1751-8628&rft.eissn=1751-8636&rft.volume=16&rft.issue=20&rft.spage=2467&rft.epage=2478&rft_id=info:doi/10.1049%2Fcmu2.12502&rft.externalDBID=10.1049%252Fcmu2.12502&rft.externalDocID=CMU212502
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1751-8628&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1751-8628&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1751-8628&client=summon