Skip to main content

Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11806))

Abstract

Unmanned aerial vehicles (UAVs) are vulnerable to jamming attacks that aim to interrupt the communications between the UAVs and ground nodes and to prevent the UAVs from completing their sensing duties. In this paper, we design a reinforcement learning based UAV trajectory and power control scheme against jamming attacks without knowing the ground node and jammer locations, the UAV channel model and jamming model. By evaluating the UAV transmission quality obtained from the feedback channel and the UAV channel condition, this scheme uses reinforcement learning to choose the UAV trajectory and transmit power based on the UAV location, signal-to-interference-and-noise ratio of the previous sensing data signal received by the ground node, and the radio channel state. Simulation results show that this scheme improves the quality of service of the UAV sensing duty given the required UAV waypoints and saves the UAV energy consumption.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bhattacharya, S., Başar, T.: Game-theoretic analysis of an aerial jamming attack on a UAV communication network. In: Proceedings of the American Control Conference, Baltimore, MD, pp. 818–823, June/July 2010

    Google Scholar 

  2. Bhunia, S., Sengupta, S.: Distributed adaptive beam nulling to mitigate jamming in 3D UAV mesh networks. In: Proceedings of the IEEE International Conference on Computing Networking Communication (ICNC), Santa Clara, CA, pp. 120–125, January 2017

    Google Scholar 

  3. Gwon, Y., Dastangoo, S., Fossa, C., Kung, H.: Competing mobile network game: Embracing antijamming and jamming strategies with reinforcement learning. In: Proceedings of the IEEE Conference on Communication Network Security (CNS), National Harbor, MD, pp. 28–36, October 2013

    Google Scholar 

  4. Han, G., Xiao, L., Poor, H.V.: Two-dimensional anti-jamming communication based on deep reinforcement learning. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), New Orleans, LA, March 2017

    Google Scholar 

  5. Kingston, D., Rasmussen, S., Humphrey, L.: Automated UAV tasks for search and surveillance. In: IEEE Conference on Control Application (CCA), Buenos Aires, Argentina, pp. 1–8, September 2016

    Google Scholar 

  6. Lv, S., Xiao, L., Hu, Q., Wang, X., Hu, C., Sun, L.: Anti-jamming power control game in unmanned aerial vehicle networks. In: Proceedings of the IEEE Global Communication Conference (GLOBECOM), Singapore, pp. 1–6, December 2017

    Google Scholar 

  7. Mnih, V., et al.: Human-level control through deep reinforcement learning. Nature 518(7540), 529–533 (2015)

    Article  Google Scholar 

  8. Roldán, J.J., del Cerro, J., Barrientos, A.: A proposal of methodology for multi-UAV mission modeling. In: Proceedings of the IEEE Mediterranean Conference on Control Automation (MED), Torremolinos, Spain, pp. 1–7, June 2015

    Google Scholar 

  9. Shin, H., Choi, K., Park, Y., Choi, J., Kim, Y.: Security analysis of FHSS-type drone controller. In: Kim, H., Choi, D. (eds.) WISA 2015. LNCS, vol. 9503, pp. 240–253. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31875-2_20

    Chapter  Google Scholar 

  10. Sun, R., Matolak, D.W.: Air–ground channel characterization for unmanned aircraft systems part II: Hilly and mountainous settings. IEEE Trans. Veh. Technol. 66(3), 1913–1925 (2017)

    Article  Google Scholar 

  11. Xiao, L., Li, Y., Dai, C., Dai, H., Poor, H.V.: Reinforcement learning-based NOMA power allocation in the presence of smart jamming. IEEE Trans. Veh. Technol. 67(4), 3377–3389 (2018)

    Article  Google Scholar 

  12. Xiao, L., Xie, C., Min, M., Zhuang, W.: User-centric view of unmanned aerial vehicle transmission against smart attacks. IEEE Trans. Veh. Technol. 67(4), 3420–3430 (2018)

    Article  Google Scholar 

  13. Xu, Y., et al.: A one-leader multi-follower Bayesian-Stackelberg game for anti-jamming transmission in UAV communication networks. IEEE Access 6, 21697–21709 (2018)

    Article  Google Scholar 

  14. Zhang, G., Wu, Q., Cui, M., Zhang, R.: Securing UAV communications via joint trajectory and power control. IEEE Trans. Wirel. Commun. 18(2), 1376–1389 (2019)

    Article  Google Scholar 

Download references

Acknowledgements

This paper was in part supported by the National Natural Science Foundation of China (Grants No. 61671396 and No. 61971366), the Natural Science Foundation of Fujian Province, China (Grant No. 2019J01843), the open research fund of National Mobile Communications Research Laboratory, Southeast University (No. 2018D08) and the Fundamental Research Funds for the Central Universities of China (No. 20720190034).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liang Xiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lin, Z., Lu, X., Dai, C., Sheng, G., Xiao, L. (2019). Reinforcement Learning Based UAV Trajectory and Power Control Against Jamming. In: Chen, X., Huang, X., Zhang, J. (eds) Machine Learning for Cyber Security. ML4CS 2019. Lecture Notes in Computer Science(), vol 11806. Springer, Cham. https://doi.org/10.1007/978-3-030-30619-9_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30619-9_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30618-2

  • Online ISBN: 978-3-030-30619-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics