Affiliation:
1. College of Information Science and Engineering, Guilin University of Technology, Guilin 541006, China
2. Guangxi Key Laboratory of Embedded Technology and Intelligent System, Guilin University of Technology, Guilin 541006, China
Abstract
The CSMA/CA algorithm uses the binary backoff mechanism to solve the multi-user channel access problem, but this mechanism is vulnerable to jamming attacks. Existing research uses channel-hopping to avoid jamming, but this method fails when the channel is limited or hard to hop. To address this problem, we first propose a Markov decision process (MDP) model with contention window (CW) as the state, throughput as the reward value, and backoff action as the control variable. Based on this, we design an intelligent CSMA/CA protocol based on distributed reinforcement learning. Specifically, each node adopts distributed learning decision-making, which needs to query and update information from a central status collection equipment (SCE). It improves its anti-jamming ability by learning from different environments and adapting to them. Simulation results show that the proposed algorithm is significantly better than CSMA/CA and SETL algorithms in both jamming and non-jamming environments. And it has little performance difference with the increase in the number of nodes, effectively improving the anti-jamming performance. When the communication node is 10, the normalized throughputs of the proposed algorithm in non-jamming, intermittent jamming, and random jamming are increased by 28.45%, 21.20%, and 17.07%, respectively, and the collision rates are decreased by 83.93%, 95.71%, and 81.58% respectively.
Funder
National Natural Science Foundation of China
Key Laboratory Found of Cognitive Radio and Information Processing, Ministry of Education
‘Ba Gui Scholars’ program of the provincial government of Guangxi
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference30 articles.
1. Rong, B. (2021). 6G: The Next Horizon: From Connected People and Things to Connected Intelligence, Cambridge Univ. Press.
2. IoT: Internet of Threats? A survey of practical security vulnerabilities in real IoT devices;Meneghello;IEEE Internet Things J.,2019
3. A survey on jamming attacks and countermeasures in WSNs;Mpitziopoulos;IEEE Commun. Surv. Tutorials,2009
4. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends;Zou;Proc. IEEE,2016
5. Classification and Development of Communication Electronic Interference;Tianyang;Commun. Technol.,2018
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献