A secure transmission method against intelligent attacks based on reinforcement learning

A technology of reinforcement learning and secure transmission, applied in the field of network communication security, to suppress attack intent, reduce attack probability, and improve security

Active Publication Date: 2021-06-29
南方电网互联网服务有限公司
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The conventional strategies in the past can only deal with the situation that the number of attacking antennas remains unchanged, and the number of antennas of the sender is much larger than that of the attacker. However, in actual situations, the number of antennas of the sender and the attacker is likely to be the same. Solving this problem is the basic motivation for invention

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure transmission method against intelligent attacks based on reinforcement learning
  • A secure transmission method against intelligent attacks based on reinforcement learning
  • A secure transmission method against intelligent attacks based on reinforcement learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0031] In this invention, we consider an adversarial wireless communication system with an intelligent attacker, who can flexibly switch between eavesdropping, jamming, spoofing and keeping silent, aiming at reducing the safe transmission rate of the system. And the attacker can freely increase the number of antennas to enhance the attack capability. In order to deal with intelligent attacks, we first set that the sender and legitimate receiver can adaptively keep ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security transmission method against intelligent attacks based on reinforcement learning, including: S1, through the channel parameter matrix signal of the system, estimate the link parameters of the main channel, interference and spoofing channels, and then respectively maximize the main channel Signal-to-noise ratio, minimize interference and spoof the signal-to-noise ratio of the channel, realize the design of the beamformer at the sending end and the filter at the receiving end, and suppress the attacker with a specific attack mode and a specific number of antennas; S2, in the beamformer and filter On the basis of S3, the zero-sum game is carried out, and based on the power control algorithm of reinforcement learning, intelligent confrontation is launched between the sender and the attacker; S3 dynamically adjusts the number of main channel sending and receiving antennas, and applies it to the beamformer And filter, zero-sum game process, effectively suppressing the attacker with smart attack mode and number of smart antennas; the invention can suppress the attack intention of the smart attacker, reduce the attack probability, and improve the system data transmission rate.

Description

technical field [0001] The invention relates to the field of network communication security, in particular to a method for secure transmission against intelligent attacks based on reinforcement learning. Background technique [0002] As a rapidly developing technology, artificial intelligence has been applied in various fields, such as face recognition, water level monitoring, etc. Recently, the application of artificial intelligence technology to the field of wireless communication has attracted the attention of many researchers. In many cases, an agent is not limited to identifying and classifying objects, but also needs to respond immediately to the state of the environment and take appropriate actions automatically. Reinforcement learning tasks are usually considered as a Markov decision-making process: the agent performs an action at the current moment, and the environment gives a reward to the agent according to the reward function. Continuous trial and error and explo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/122H04W52/24H04W52/38
CPCH04L63/20H04W12/00H04W52/241H04W52/243H04W52/38
Inventor 范立生李超陈庆春夏隽娟谭伟强
Owner 南方电网互联网服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products