Jamming bandits-a novel learning method for optimal jamming
dc.citation.epage | 2808 | en_US |
dc.citation.issueNumber | 4 | en_US |
dc.citation.spage | 2792 | en_US |
dc.citation.volumeNumber | 15 | en_US |
dc.contributor.author | Amuru, S. | en_US |
dc.contributor.author | Tekin, C. | en_US |
dc.contributor.author | Van Der Schaar, M. | en_US |
dc.contributor.author | Buehrer, R.M. | en_US |
dc.date.accessioned | 2018-04-12T11:48:09Z | |
dc.date.available | 2018-04-12T11:48:09Z | |
dc.date.issued | 2016 | en_US |
dc.department | Department of Electrical and Electronics Engineering | en_US |
dc.description.abstract | Can an intelligent jammer learn and adapt to unknown environments in an electronic warfare-type scenario? In this paper, we answer this question in the positive, by developing a cognitive jammer that adaptively and optimally disrupts the communication between a victim transmitter-receiver pair. We formalize the problem using a multiarmed bandit framework where the jammer can choose various physical layer parameters such as the signaling scheme, power level and the on-off/pulsing duration in an attempt to obtain power efficient jamming strategies. We first present online learning algorithms to maximize the jamming efficacy against static transmitter-receiver pairs and prove that these algorithms converge to the optimal (in terms of the error rate inflicted at the victim and the energy used) jamming strategy. Even more importantly, we prove that the rate of convergence to the optimal jamming strategy is sublinear, i.e., the learning is fast in comparison to existing reinforcement learning algorithms, which is particularly important in dynamically changing wireless environments. Also, we characterize the performance of the proposed bandit-based learning algorithm against multiple static and adaptive transmitter-receiver pairs. | en_US |
dc.description.provenance | Made available in DSpace on 2018-04-12T11:48:09Z (GMT). No. of bitstreams: 1 bilkent-research-paper.pdf: 179475 bytes, checksum: ea0bedeb05ac9ccfb983c327e155f0c2 (MD5) Previous issue date: 2016 | en |
dc.identifier.doi | 10.1109/TWC.2015.2510643 | en_US |
dc.identifier.issn | 1536-1276 | en_US |
dc.identifier.uri | http://hdl.handle.net/11693/37690 | en_US |
dc.language.iso | English | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1109/TWC.2015.2510643 | en_US |
dc.source.title | IEEE Transactions on Wireless Communications | en_US |
dc.subject | Convergence | en_US |
dc.subject | Jamming | en_US |
dc.subject | Learning | en_US |
dc.subject | Multiarmed bandits | en_US |
dc.subject | Optimal | en_US |
dc.subject | Regret | en_US |
dc.subject | Algorithms | en_US |
dc.subject | Electronic warfare | en_US |
dc.subject | Network layers | en_US |
dc.subject | Reinforcement learning | en_US |
dc.subject | Transmitters | en_US |
dc.subject | Multi armed bandit | en_US |
dc.subject | Learning algorithms | en_US |
dc.title | Jamming bandits-a novel learning method for optimal jamming | en_US |
dc.type | Article | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Jamming Bandits - A Novel Learning Method for Optimal Jamming.pdf
- Size:
- 2.25 MB
- Format:
- Adobe Portable Document Format
- Description:
- Full printable version