Master User Simulation Attack Detection Method Based on Reinforcement Learning Algorithm
A technology of enhanced learning and simulated attack, applied in electrical components, safety devices, transmission systems, etc., can solve problems such as inability to obtain detection performance, and achieve good application prospects, improved detection performance, and high detection probability.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] The present invention will be described in further detail below with reference to the accompanying drawings and examples.
[0039] This example works on a CRN where the channel environment changes, such as figure 1 As shown, the environment meets the following conditions:
[0040] (1) In each time slot, in order to ensure that there is no communication conflict, there is at most one user in the CRN area that transmits signals and occupies the spectrum;
[0041] (2) In the kth time slot, the working probability of the PU is p; when the PU is not working, the MU launches an attack with the probability q, where q≤1-p;
[0042] (3) SU receives signals from PU and MU considering the influence of channel multipath fading;
[0043] (4) In each time slot, the benefit of SU using the idle spectrum is G, and the cost of causing interference to the primary user network is C.
[0044] Such as figure 2 , this example is implemented through the following steps:
[0045] Step 1....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


