Encyclopedia of Wireless Networks

Living Edition
| Editors: Xuemin (Sherman) Shen, Xiaodong Lin, Kuan Zhang

Reinforcement Learning-Based Wireless Communications Against Jamming and Interference

  • Liang XiaoEmail author
Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-32903-1_71-1


Learning-based anti-jamming communication strategy applies reinforcement learning algorithms for mobile users in wireless networks to achieve the optimal transmission policy against jamming and interference, without knowing the network model, radio channel model, and jamming model.

Historical Background

Due to the broadcast nature of radio propagation, wireless networks are vulnerable to jamming attacks, as jammers purposefully inject replayed or faked signals into wireless media to interrupt the ongoing radio transmissions between legitimate users (Xu et al., 2005; Xiao, 2015). With the pervasion of smart and programmable radio devices such as universal software radio peripherals (USRPs) (Rahbari et al., 2016), smart jammers choose to launch multiple types of attacks, such as eavesdropping and spoofing attacks, and select the jamming power, frequency, and time against the ongoing wireless transmissions (Trappe, 2015; Xiao et al., 2018a). Smart jammers can even analyze the...

This is a preview of subscription content, log in to check access.



This work is supported by the National Natural Science Foundation of China under Grant 61671396.


  1. Akyildiz IF, Lee WY, Vuran MC, Mohanty S (2008) A survey on spectrum management in cognitive radio networks. IEEE Commun Mag 46(4):40–49CrossRefGoogle Scholar
  2. Attar A, Tang H, Vasilakos AV, Yu FR, Leung VCM (2012) A survey of security challenges in cognitive radio networks: solutions and future research directions. Proc IEEE 100(12):3172–3186CrossRefGoogle Scholar
  3. Conley WG, Miller AJ (2013) Cognitive jamming game for dynamically countering ad hoc cognitive radio networks. In: Military communications conference, MILCOM 2013-2013 IEEE. IEEE, San Diego, CA, pp 1176–1182Google Scholar
  4. Gwon Y, Dastangoo S, Fossa C, Kung H (2013) Competing mobile network game: embracing antijamming and jamming strategies with reinforcement learning. In: 2013 IEEE conference on communications and network security (CNS). IEEE, National Harbor, MD, pp 28–36Google Scholar
  5. Han G, Xiao L, Poor HV (2017) Two-dimensional anti-jamming communication based on deep reinforcement learning. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP), New Orleans, LA, pp 1–5Google Scholar
  6. Li C, Dai H, Xiao L, Ning P (2010) Analysis and optimization on jamming-resistant collaborative broadcast in large-scale networks. In: 2010 conference record of the forty fourth asilomar conference on signals, systems and computers (ASILOMAR). IEEE, Pacific Grove, CA, pp 1859–1863CrossRefGoogle Scholar
  7. Li C, Dai H, Xiao L, Ning P (2012) Communication efficiency of anti-jamming broadcast in large-scale multi-channel wireless networks. IEEE Trans Signal Process 60(10):5281–5292MathSciNetCrossRefGoogle Scholar
  8. Liu A, Ning P, Dai H, Liu Y (2010) USD-FH: jamming-resistant wireless communication using frequency hopping with uncoordinated seed disclosure. In: 2010 IEEE 7th international conference on mobile adhoc and sensor systems (MASS). IEEE, San Francisco, CA, pp 41–50Google Scholar
  9. Mnih V, Kavukcuoglu K, Silver D, Rusu AA, Veness J, Bellemare MG, Graves A, Riedmiller M, Fidjeland AK, Ostrovski G (2015) Human-level control through deep reinforcement learning. Nature 518(7540): 529–533CrossRefGoogle Scholar
  10. Rahbari H, Krunz M, Lazos L (2016) Swift jamming attack on frequency offset estimation: the achilles heel of OFDM systems. IEEE Trans Mob Comput 15(5): 1264–1278CrossRefGoogle Scholar
  11. Sutton R, Barto AG (1998) Reinforcement learning: an introduction. MIT Press, CambridgeGoogle Scholar
  12. Trappe W (2015) The challenges facing physical layer security. IEEE Commun Mag 53(6):16–20CrossRefGoogle Scholar
  13. Wang Q, Xu P, Ren K, Li XY (2012) Towards optimal adaptive UFH-based anti-jamming wireless communication. IEEE J Sel Areas Commun 30(1):16–30CrossRefGoogle Scholar
  14. Xiao L (2015) Anti-jamming transmissions in cognitive radio networks. Springer, ChamCrossRefGoogle Scholar
  15. Xiao L, Chen Y, Lin WS, Liu KR (2012a) Indirect reciprocity security game for large-scale wireless networks. IEEE Trans Inf Forensics Secur 7(4): 1368–1380CrossRefGoogle Scholar
  16. Xiao L, Dai H, Ning P (2012b) Jamming-resistant collaborative broadcast using uncoordinated frequency hopping. IEEE Trans Inf Forensics Secur 7(1):297–309CrossRefGoogle Scholar
  17. Xiao L, Dai H, Ning P (2012c) MAC design of uncoordinated FH-based collaborative broadcast. IEEE Wirel Commun Lett 1(3):261–264CrossRefGoogle Scholar
  18. Xiao L, Yan Q, Lou W, Chen G, Hou YT (2013) Proximity-based security techniques for mobile users in wireless networks. IEEE Trans Inf Forensics Secur 8(12):2089–2100CrossRefGoogle Scholar
  19. Xiao L, Chen T, Liu J, Dai H (2015) Anti-jamming transmission Stackelberg game with observation errors. IEEE Commun Lett 19(6):949–952CrossRefGoogle Scholar
  20. Xiao L, Li Y, Dai C, Dai H, Poor HV (2017) Reinforcement learning-based NOMA power allocation in the presence of smart jamming. IEEE Trans Veh Technol 67(4):3377–3389CrossRefGoogle Scholar
  21. Xiao L, Jiang D, Wan X, Su W, Tang Y (2018a) Anti-jamming underwater transmission with mobility and learning. IEEE Commun Lett 22:542–545CrossRefGoogle Scholar
  22. Xiao L, Lu X, Xu D, Tang Y, Wang L, Zhuang W (2018b) UAV relay in VANETs against smart jamming with reinforcement learning. IEEE Trans Veh Technol 67:4087–4097CrossRefGoogle Scholar
  23. Xiao L, Wan X, Dai C, Du X, Chen X, Guizani M (2018c) Security in mobile edge caching with reinforcement learning. IEEE Wirel Commun Mag 25(3):116–122CrossRefGoogle Scholar
  24. Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing. ACM, New York, NY, pp 46–57Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department Communication EngineeringXiamen UniversityXiamenChina

Section editors and affiliations

  • Hsiao-hwa Chen

There are no affiliations available