Next Article in Journal
Therapeutic Strategy and Clinical Path of Facioscapulohumeral Muscular Dystrophy: Review of the Current Literature
Previous Article in Journal
Variations in Microstructure and Collapsibility Mechanisms of Malan Loess across the Henan Area of the Middle and Lower Reaches of the Yellow River
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Parameter Control Anti-Jamming Algorithm for Wireless Communication Systems Based on Linear–Quadratic Regulator

1
School of Electronic Information Engineering, Nanjing University of Information Science & Technology, Nanjing 210044, China
2
The Sixty-Third Research Institute, National University of Defense Technology, Nanjing 210007, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(18), 8216; https://doi.org/10.3390/app14188216
Submission received: 10 August 2024 / Revised: 6 September 2024 / Accepted: 11 September 2024 / Published: 12 September 2024

Abstract

:
In response to the challenge of existing wireless communication anti-jamming methods in effectively handling unknown jamming, this paper proposes a multi-parameter control anti-jamming algorithm for wireless communication systems based on the Linear–Quadratic Regulator (LQR). First, the proposed algorithm models the wireless communication system as a linear switched system based on the modulation and coding scheme. Subsequently, a feedback controller design method based on the LQR is introduced. By utilizing the multiple Lyapunov function method combined with linear matrix inequalities, sufficient criteria for the asymptotic stability of the system under unknown jamming conditions are provided. Finally, theoretical analysis and simulation results indicate that the proposed algorithm can rapidly adjust modulation and coding schemes as well as transmission power in complex jamming environments, thereby maintaining bit error rate (BER) stability and enhancing the reliability of the communication system.

1. Introduction

Due to the open nature of the channel, wireless communication is susceptible to both inadvertent and intentional jamming, significantly reducing the reliability and effectiveness of information transmission [1]. To ensure reliable transmission in harsh electromagnetic environments, it is necessary to research anti-jamming technologies. Currently, common anti-jamming techniques in communication include spread spectrum [2], power control [3], and rate adaptation. However, traditional anti-jamming methods often rely on fixed strategies or rules. While these methods can counteract certain types and levels of malicious jamming, predefined patterns and parameters struggle to handle carefully designed malicious attacks, how to achieve efficient communication under unknown and dynamic malicious jamming has become a current research focus [4,5].
Reinforcement learning is a machine learning technique inspired by the living organisms’ natural tendency to avoid harm. In reinforcement learning, the agent interacts with the external environment by performing various actions and continuously learns from the feedback provided by the environment, thereby discovering strategies that are more advantageous to itself [6]. Recently, reinforcement learning-based anti-jamming technologies for communication systems have garnered widespread attention. For example, Reference [7] models the anti-jamming problem under temporal random pulse jamming as a Markov Decision Process (MDP) and proposes a Q-learning-based temporal anti-jamming algorithm, which enables the transmitter to flexibly switch between active and silent states to evade random pulse jamming. Reference [8] proposes an alternating reinforcement learning anti-jamming algorithm for channel selection and power control under tracking jamming threats, which achieves optimal channel selection and suboptimal power control. However, real-world communication anti-jamming problems often involve large state-action spaces, leading to the “curse of dimensionality”. Classic reinforcement learning methods, which explore state-action spaces through single-step iteration, struggle to converge [9] and face challenges in solving real-time online anti-jamming decision problems in complex jamming environments.
Deep reinforcement learning (DRL) [10], with its powerful fitting capabilities through deep neural networks, alleviates the curse of dimensionality problem faced by traditional reinforcement learning, enabling effective anti-jamming in complex jamming environments. For instance, Reference [11] proposes a cross-domain anti-jamming algorithm based on Deep Q-Network (DQN), which enables mobile nodes to learn optimal strategies for position adjustment and power control in unknown dynamic jamming environments, thereby achieving reliable transmission. Reference [12] presents a deep reinforcement learning anti-jamming scheme based on the Actor-Critic (AC) framework for mobile edge networks, capable of simultaneously selecting offloading nodes, transmission power, and data rates to achieve anti-jamming data offloading. However, DRL algorithms represented by DQN have a slower adaptation speed to jamming environments, requiring longer training times, and struggle to maintain communication reliability under unknown and rapidly changing jamming.
To overcome the aforementioned drawbacks, some researchers have explored communication anti-jamming methods based on control theory [13]. From the perspective of control theory, the normal transmission of wireless communication systems under unknown jamming is viewed as a control process affected by disturbance, with the jamming modeled as time-varying uncertainty disturbances in the control system. This approach helps to address or circumvent the limitations of existing machine learning-based anti-jamming algorithms. Reference [14] proposes a robust power control scheme for cognitive radio networks based on Lyapunov stability theory and switched affine systems. However, due to the specific network forms targeted, the proposed methods are difficult to apply to general wireless communication networks, limiting its universality. Reference [15] introduces a stability control algorithm based on switched systems and multiple Lyapunov functions, which can adaptively adjust modulation and coding schemes as well as transmission power according to jamming conditions, thereby improving BER performance and maintaining system stability. However, for more complex electromagnetic environments, simple state feedback controllers may not provide sufficient stability guarantees and convergence speed. Table 1 shows the advantages and disadvantages of existing algorithms.
This paper introduces optimal control and proposes a multi-parameter control anti-jamming algorithm for wireless communication systems based on system dynamic descriptions, which does not rely on known system parameters. This approach enhances transmission reliability and achieves effective anti-jamming communication in rapidly varying unknown jamming environments.
Specifically, the innovations of this paper can be summarized as follows:
  • To address the complexity associated with simultaneous adjustment of power and modulation coding in communication systems, this paper introduces a modeling approach based on linear switching systems. By employing stability analysis theory, control rules based on the signal-to-jamming-and-noise ratio (SJNR) are formulated, which delineate switching intervals and correspondingly match modulation and coding schemes, thereby effectively reducing system complexity.
  • In the subsystem, the Linear–Quadratic Regulator (LQR) is introduced for power control to achieve the rapid stabilization of the bit error rate under burst interference. Additionally, the multiple Lyapunov function method is employed to optimize stability rules by constructing a corresponding Lyapunov function for each modulation and coding scheme, thereby reducing the conservativeness of the stability rules.
The structure of this paper is organized as follows: Section 2 describes the problem and system modeling methods; Section 3 provides a detailed design of the feedback controller in the subsystem; Section 4 presents the sufficient conditions for stability control rules; Section 5 details the methodology and steps of the algorithm, along with the system flowchart; Section 6 conducts comprehensive experiments under three types of jamming; and Section 7 summarizes the paper and presents the conclusions.

2. Problem Description and System Modeling

The system model of this paper is illustrated in Figure 1. The wireless communication system consists of a transmitter and a corresponding receiver, with adaptive capabilities for power and modulation coding adjustment. The communication transmission of this system is affected by a malicious jammer, and the jamming signal can effectively cover the receiver. Consider an anti-jamming control model for the wireless communication system, as shown in Figure 2. After perceiving the electromagnetic environment, the transmitter adjusts its transmission power and modulation coding based on feedback information to ensure that the receiver’s bit error rate does not exceed the preset target error rate.
For the convenience of the study, the following assumptions are made in this paper:
  • The transmitter’s transmission power is P s ( t ) , and the wireless communication system operates over an Additive White Gaussian Noise (AWGN) channel.
  • The receiver has spectrum sensing capability, allowing it to sense the power levels of jamming and noise in channel on a time-slot basis, but it cannot determine the behavior characteristics, patterns, or probability distribution of the jamming.
  • Ignoring free-space propagation losses, and with both the transmission power P s ( t ) and the power of jamming plus noise P J ( t ) in the channel expressed in dBm, the SJNR during transmission can be simply represented as: SJNR ( t ) = P s ( t ) P J ( t ) .
  • The BER at the receiver under P s ( t ) is y BER ( t ) , with the target BER for normal system operation being y r ( t ) .
  • The system has M modulation and coding schemes, corresponding to M transmission rates, where i { 1 , , M } represents the system under the i-th modulation and coding combination.
Figure 3 shows the schematic curves of system BER under different modulation and channel coding combinations.
The purpose of system modeling is to describe the system using the following form of linear differential switching equations:
d x i ( t ) / d t = A i x i ( t ) + B i u i ( t ) y BER ( t ) = C i x i ( t ) + D i
Here, A i , B i , C i , D i are referred to as the dynamic characteristic coefficients, control coefficients, sensing coefficients, and direct terms of the i-th subsystem, respectively.
Choose the transmission power as the control input variable, the SJNR at the receiver as the system state variable, and the BER as the system output variable.
The curves of BER versus SJNR under different modulation and coding schemes are shown in Figure 3. It can be observed that when the BER P e 1 0 3 , the BER curve generally enters the “waterfall area” and can be approximated as a straight line. Therefore, a linear equation can be used to approximate the relationship between SJNR and BER for a given modulation and coding scheme. Consequently, the system under M modulation and coding combinations can be expressed in the following piecewise function form:
y BER t = C 1 x i t + D 1 ,   X 1 x < X 2 C 2 x i t + D 2 ,   X 2 x < X 3 C i x i t + D i ,   X i x < X i + 1 C M x M t + D M ,   X M x
In the formula, the sensing coefficient C i and the direct term D i are determined by the slope and intercept of the fitted line for a given modulation and coding scheme; i represents the currently active subsystem, and X i is the SJNR threshold value for the i-th modulation and coding scheme. Since the SJNR at the receiver at time t can be expressed as SJNR ( t ) = P s ( t ) P J ( t ) , the system state is composed of the control input u ( t ) and the noise and jamming power at that time. Assuming that the received noise and jamming power can be accurately measured, it follows that:
x i t + Δ t = u i t P J t
According to Equation (3), the rate of change in the SJNR over time for the i-th modulation and coding scheme is:
d x i ( t ) d t = A i x i ( t ) + B i u p ( t ) P J ( t ) X i x X i + 1 , i = 1 , , M
In the formula, u p ( t ) represents the control parameter for the i-th modulation and coding scheme. According to Equation (2), the dynamic characteristic parameters are A i = 1 and the control parameters are B i = 1 . Therefore, combining Equations (1) and (4), the state equation of the system can be modeled in the following switching system form:
d x i ( t ) d t = x i ( t ) + u p ( t ) P J ( t ) y BER ( t ) = C i x i ( t ) + D i X i x X i + 1 , i = 1 , , M
To simplify the calculations, define
u 1 ( t ) = u ( t ) P J ( t )
Thus, Equation (5) is:
d x i ( t ) d t = x i ( t ) + u 1 ( t ) y BER ( t ) = C i x i ( t ) + D i X i x X i + 1 , i = 1 , , M
The control rule of the wireless communication switching system is to divide the switching intervals based on the SJNR, with each interval corresponding to a specific modulation and coding scheme. In the event of jamming, if the strength of the jamming is considerable, resulting in an instantaneous shift in the SJNR interval from one modulation and coding scheme to another, the system initiates a transition in the modulation and coding scheme and subsequently adjusts the transmission power in a manner that ensures the desired BER is maintained. In the event of weak jamming, which results in the instantaneous SJNR remaining within the same interval, the adjustment made is to the transmission power. This is illustrated in Figure 4.
The stability control problem of the wireless communication switching system lies in how the system’s BER can quickly converge to the target value when the system perceives the electromagnetic environment and adjusts its transmission power, modulation, and coding schemes accordingly. The following section designs the anti-jamming power controller introduced in each wireless communication switching subsystem.

3. Design of the Feedback Controller

To ensure that the output BER of the wireless communication system quickly stabilizes at the target value, appropriate state feedback must be used to configure the system’s eigenvalues. Therefore, each subsystem’s feedback loop employs continuous-time linear quadratic optimal control [16], as shown in Figure 5. The goal is to design a state feedback controller u ˜ 1 ( t ) = K x ˜ ( t ) that minimizes the quadratic cost function of the system state, ensuring that the output y r ( t ) of the jammed communication system quickly restores the target bit error rate in an optimal form according to the performance criteria. This approach enables a fast response to external jamming while maintaining system stability.
For convenience in analyzing the switching system, let:
x ( t ) = x 1 t x 2 t x i t x M t X 1 x 1 < X 2 X 2 x 2 < X 3 X i x i < X i + 1 X M x M
The system state can thus be transformed into:
x ˙ ( t ) = A 1 x 1 ( t ) + B 1 u 1 ( t ) A 2 x 2 ( t ) + B 2 u 1 ( t ) A i x 3 ( t ) + B i u 1 ( t ) A M x 4 ( t ) + B M u 1 ( t ) = A x ( t ) + B u 1 ( t )
where A = A 1 A 2 A i A M T , B = B 1 B 2 B i B M T .
In the absence of jamming, the equilibrium point of the wireless communication system is ( x r ( t ) , u r ( t ) ) , where x r ( t ) is the target SJNR, and u r ( t ) is the target transmission power. Let x ˜ ( t ) = x ( t ) x r ( t ) , u ˜ 1 ( t ) = u 1 ( t ) u r ( t ) , where x ˜ ( t ) represents the system state error and u ˜ 1 ( t ) represents the control input error. Then, the system dynamic error equation is x ˜ ˙ ( t ) = A x ˜ ( t ) + B u 1 ( t ) .
Substituting the state feedback controller into the dynamic error equation yields:
x ˜ ˙ ( t ) = ( A B K ) x ˜ ( t ) = A c x ˜ ( t )
The quadratic performance index is:
J ( t ) = 1 2 0 ( x ˜ ( t ) T Q x ˜ ( t ) + u 1 ( t ) T R u 1 ( t ) ) d t
where Q 0 represents the weight of the system state variables, and R > 0 represents the weight of the system control inputs.
Substituting Equation (10) into the cost function J ( t ) yields:
J ( t ) = 1 2 0 x ˜ ( t ) T ( Q + K T R K ) x ˜ ( t ) d t
To solve for matrix K, the presence of the integral term complicates the calculation. Therefore, it is assumed that there exists a constant matrix P such that:
d d t ( x ˜ ( t ) T P x ˜ ( t ) ) = x ˜ ( t ) T ( Q + K R K ) x ˜ ( t )
Substituting Equation (13) into the cost function given by Equation (12) yields:
J ( t ) = 1 2 0 d d t ( x ˜ ( t ) T P x ˜ ( t ) ) d t = 1 2 x ˜ ( t ) T P x ˜ ( t ) | 0 = 1 2 x ˜ ( 0 ) T P x ˜ ( 0 )
Simplifying Equation (14) yields:
x ˜ ˙ ( t ) T P x ˜ ( t ) + x ˜ ( t ) T P x ˜ ˙ ( t ) + x ˜ ( t ) T Q x ˜ ( t ) + x ˜ ( t ) T K T R K x ˜ ( t ) = 0
Substituting Equation (10) into Equation (14) gives:
x ˜ ( t ) T A c T P x ˜ ( t ) + x ˜ ( t ) T P A c x ˜ ˙ ( t ) + x ˜ ( t ) T Q x ˜ ( t ) + x ˜ ( t ) T K T R K x ˜ ( t ) = 0
x ˜ ( t ) T ( A c T P + P A c + Q + K T R K ) x ˜ ( t ) = 0
It can be demonstrated that for Equation (17) to be valid, the terms within the parentheses must be identically zero, which yields:
A c T P + P A c + Q + K T R K = 0
A c = A B K
( A B K ) T P + P ( A B K ) + Q + K T R K = 0
A T P + P A + Q + K T R K K T B T P P R K = 0
Equation (21) contains a quadratic term involving matrix K, which complicates the calculations. Additionally, since matrix P is assumed to be a constant matrix, it is therefore assumed that:
K T R K = K T B T P
Thus, it can be obtained that:
K = R 1 B T P
Substituting Equation (22) into Equation (21) to eliminate the quadratic term involving K yields:
A T P + P A + Q P B R 1 B T P = 0
Equation (24) is referred to as the degenerate matrix Riccati equation. By solving this equation, matrix P can be obtained. If a positive definite matrix P exists, the system is stable. Matrix P can then be substituted into Equation (21) to obtain matrix K. The resulting state feedback matrix K is the optimal matrix.
Thus, the optimal state feedback controller can be obtained as:
u ˜ 1 ( t ) = K x ˜ ( t )
Due to the variable substitutions made for analytical convenience, the actual output of the current wireless communication system power controller, according to Equation (6), should be:
u ( t ) = u 1 ( t ) + P J ( t ) = u ˜ 1 ( t ) + u r ( t ) + P J ( t ) = K ( x ( t ) x r ( t ) ) + u r ( t ) + P J ( t )

4. Sufficient Conditions for Stability Control Rules

The main objective of this section is to derive a sufficient condition for achieving the asymptotic stabilization of the wireless communication switching system using the multiple Lyapunov function method.
Based on the system described by Equation (7), for a simpler analysis, define the augmented vector Φ ( t ) = [ x i ( t ) 1 ] T . The state equation of the system is then simplified to:
Φ ˙ ( t ) = L i Φ ( t )
where
L i = A i B i K i 0 = A i 0 B i 0 K i 0 = A b i B b i · K n i
In the equation, A b i = A i 0 , B b i = B i 0 , K n i = K i 0 .
Lemma 1 (Schur Complement) [17].
For a given symmetric matrix S = S 11 S 12 S 12 T S 22 , the following three conditions are equivalent:
(1)
S < 0
(2)
S 11 < 0 , S 22 S 12 T S 11 −1S12 < 0
(3)
S 22 < 0 , S 11 S 12 T S 22 −1S12 < 0
The following provides the Lyapunov stability theorem for the asymptotic stability of the system.
Theorem 1 (Lyapunov Asymptotic Stability Theorem) [17].
The fundamental idea is to analyze the stability of the system from the perspective of energy change. If the stored energy of the system decreases over time as the system evolves, then the system is stable; otherwise, the system is unstable. A scalar function  V ( x )  can be used to represent the system’s energy. Thus, if the scalar function is positive definite and
(1)
If the time derivative of the scalar function  V ˙ ( x )  is negative definite, then the origin is asymptotically stable;
(2)
If the scalar function  V ˙ ( x )  is positive definite, then the origin is unstable.
The following provides a sufficient condition for the system described by Equation (7) to achieve asymptotic stability using the state feedback given by Equation (26).
Theorem 2.
Assume that for  i , j 1 , , M 2 , where M represents the number of wireless communication systems under different coding and modulation schemes, and  { A i , B i , C i , D i }  is controllable. For such a closed-loop multi-parameter wireless communication system described as a switching system (27), if there exist M symmetric positive definite matrices   X i  such that the following inequalities hold:
Q = X i ( A b i X i B b i K n i X i ) T A b i X i B b i K n i X i X i < 0
then, at the switching moment, after switching from the i-th subsystem to the j-th subsystem, the multi-parameter wireless communication switching system is asymptotically stable.
Proof. 
Let the Lyapunov functions for the system at time t and at the switching moment t + Δ t be respectively:
V Φ t = Φ T t P i Φ t ,   V Φ t + Δ t = Φ T t + Δ t P j Φ t + Δ t ,   P i = P i T > 0 ,   P j = P j T > 0 ,
The difference equation for the function is:
Δ V Φ t = V Φ t + Δ t V Φ t = Φ T t + Δ t P j Φ t + Δ t Φ T t P i Φ t = Φ T t L T P j j L j Φ t Φ T t P i Φ t = Φ T t L T P j j L j P i Φ t
If it is possible to ensure that L T P j j L j P i < 0 , then Δ V Φ t < 0 . According to Lyapunov stability theory, the closed-loop system is asymptotically stable. Therefore, using the Schur complement of Lemma 1, the following matrix inequality L T P j j L j P i < 0 is equivalent to
P i L j T L j P j 1 < 0
Substituting Equation (28) into the above expression, it can be rewritten as:
P i A b j B b j K n j T A b j B b j K n j P j 1 < 0
Multiply both sides of the above inequality (32) on the left and right by diag P i 1 , I , and let X i = P i 1 ,   X j = P j 1 ; it follows that:
P i 1 0 0 I P i A b j B b K n j T A b j B b K n i P j 1 P i 1 0 0 I = X i A b j X i B b K n j X i T A b j X i B b K n j X i X j < 0
Theorem 2 is proven. □

5. Implementation Steps and Flowchart of the Proposed Method

During the performance simulation of the proposed algorithm, the system state and input at each time step are computed based on Equation (5). To mitigate potential errors arising from the discretization of continuous systems, the fourth-order Runge–Kutta method is employed to approximate the continuous system [18]. This method is designed to simulate the continuous system’s dynamic behavior with high accuracy during the time-stepping process, thereby minimizing errors introduced by system discretization. The specific steps are as follows:
When the solution process reaches the t time step, to calculate the SJNR at the next time step t + 1 moment, the first slope k 1 = ( A i x i ( t ) + B i u 1 ( t ) ) · d t is obtained from the system state at the current time t . Then, the second slope k 2 = A i ( x i ( t ) + k 1 / 2 ) + B i u 1 ( t + d t / 2 ) · d t is computed using the first slope k 1 , followed by the third slope k 3 = A i ( x ( t ) + k 2 / 2 ) + B i u 1 ( t + d t / 2 ) · d t , which is derived from the second slope k 2 . Finally, the fourth slope k 4 = A i ( x ( t ) + k 3 ) + B i u 1 ( t + d t ) · d t is calculated using the third slope k 3 . The weighted average of these slopes is then used as an approximation of the average rate of change in SJNR: x ˙ i ( t ) = x i ( t ) + ( k 1 + 2 k 2 + 2 k 3 + k 4 ) · d t / 6 .
Based on the above analysis, the specific algorithm flow is as follows (Algorithm 1):
Algorithm 1: Multi-parameter Control Anti-jamming Algorithm for Wireless Communication System Based on LQR
1: Initialization: Set the initial values of the system: system target bit error rate yr(t), system state equilibrium point (xr(t), ur(t)), step size dt
2: for t = 1, 1 + dt,⋯, T do
3: Calculate the current system output bit error rate by substituting the system state xi(t) into Equation (5);
4: Substitute the signal-to-jamming-and-noise ratio (SJNR) and the output of the power controller (Equation (26)) into the system state equation (Equation (5)). Then, apply the fourth-order Runge–Kutta method for numerical integration of the state equation to solve for the rate of change in SJNR x ˙ i ( t ) ;
5: Substitute the rate of change into x i t + d t = x i t + x ˙ i t to determine the SJNR at the next time step;
6: Switch the subsystem based on the value of the SJNR, adjust the modulation and coding scheme, and modify the power accordingly;
7: t = t + 1;
8: end for
The system flowchart is shown in Figure 6.

6. Simulation Analysis

In this section, MATLAB simulations are conducted to evaluate the performance of the proposed power control algorithm within the subsystems, the impact of weights on subsystem performance, and the performance of the multi-parameter control anti-jamming algorithm for wireless communication systems based on LQR.
Simulation 1 compares the performance of the proposed power control algorithm within the wireless communication subsystem with that of the traditional power adaptive algorithm and the power control algorithm base on PID under sudden jamming conditions.
Using Binary Phase Shift Keying (BPSK) modulation and (2016, 504) Low-Density Parity-Check Code (LDPC) as examples, the BER curve, after fitting, results in a straight line y t = 2.4 x t 10.8 , and then the sensing coefficient C = 2.4 . The state weight Q is set to 10, the input weight R is set to 0.001, the simulation duration is 10s, the sampling interval is 0.01 s, and the target BER is 10−4. Figure 7 illustrates the simulation comparison of BER curves for the proposed power control algorithm in the subsystem, traditional power adaptive algorithms, and power control algorithms based on PID under burst jamming conditions.
From Figure 7a, it can be observed that the communication system’s transmission channel is AWGN with a signal-to-noise ratio of 30 dB. The system experiences a burst jamming with a power of 5 dBm at t = 5 s, lasting for 0.2 s. Figure 7b shows that the proposed algorithm can rapidly respond to jamming, with a response speed significantly superior to existing methods. The proposed algorithm converges to the target BER within 0.01s, even while the jamming persists. Compared to the power control algorithm based on PID and traditional power adaptive methods, the proposed algorithm achieves faster convergence of the output BER to the target BER and exhibits less BER fluctuation.
Simulation 2 compares the impact of different weighting factors on the performance of the power control algorithm in the proposed subsystem.
From Figure 8a, it can be observed that the system is subjected to periodic pulse jamming with a power of 5 dBm, lasting 0.2 s with a period of 1 s. Figure 8b shows the bit error rate curve with the selected state variable weight Q = 10 and varying control input weights. It is evident that as the control input weight decreases, the oscillation amplitude of the system output becomes more subdued and the response time improves. This is because reducing the control input weight lowers the penalty on the control input, allowing the system to apply a larger control input to more rapidly adjust the state variables to the target values.
In Simulation 3, the performance of the proposed multi-parameter control anti-jamming algorithm for wireless communication systems based on LQR is compared and analyzed with that of the power control algorithm based on LQR for unmodeled switching systems, as well as the multi-parameter control anti-jamming algorithm based on PID, under the condition of random pulse jamming.
Assume that the system initially uses Quadrature Phase Shift Keying (QPSK) modulation and (2016, 504) LDPC coding for information transmission. The system is capable of switching between different modulation and coding schemes freely when exposed to external jamming, while maintaining a high transmission rate in the absence of jamming or when jamming is minimal.
Using QPSK modulation and BPSK modulation, with both using (2016, 504) LDPC coding, as examples of switching between two subsystems, the BER curves, after fitting, are represented by straight lines y BER ( t ) = 3.3 x i ( t ) 9 and y BER ( t ) = 2.4 x i ( t ) 14.8 , respectively. Therefore, based on the system modeling conclusions, the linear state equations for these two subsystems can be obtained as follows:
d x i ( t ) d t = x i ( t ) + u 1 ( t ) y BER ( t ) = 3.3 x i ( t ) 9
d x i ( t ) d t = x i ( t ) + u 1 ( t ) y BER ( t ) = 2.4 x i ( t ) 14.8
From Figure 3, it can be observed that when the BER of the wireless communication system reaches the target value of 10−4, the signal-to-jamming-plus-noise ratio of the system under QPSK modulation is −1.5. Furthermore, when SJNR < 1.5 , the bit error rate of the system under QPSK modulation is greater than the target value of 10−4, while the BER under BPSK modulation remains within the target range. Therefore, to ensure that the system’s BER remains within the target value while switching to the optimal modulation and coding scheme, the switching intervals for the two modulation and coding schemes are set as SJNR < 1.5 and SJNR > 1.5 , respectively. The system’s state-space equations are then given by:
x ˙ ( t ) = A x ( t ) + B u 1 ( t ) = A 1 x 1 ( t ) + B 1 u 1 ( t ) x 1 < 1.5 A 2 x 2 ( t ) + B 2 u 1 ( t ) x 2 > 1.5 y BER ( t ) = 3.3 x 1 ( t ) 9 2.4 x 2 ( t ) 14.8
Figure 9 presents a simulation comparison of the BER curves for the proposed algorithm, the power control algorithm based on LQR for unmodeled switching systems, and the multi-parameter control anti-jamming algorithm for wireless communication systems based on PID under random jamming conditions.
From Figure 9a, it can be observed that the communication system’s transmission channel is AWGN with a signal-to-noise ratio of 30 dB, and the channel is subjected to random pulse jamming with power levels of 1 dBm and 5 dBm. Figure 9b shows the BER curves of each system as a function of time. The analysis reveals that the power-controlled communication system without the switching mechanism experiences a sudden increase in BER under higher power jamming, peaking at 10−3.833, which significantly affects the transmission reliability of the communication system. The BER of the multi-parameter control anti-jamming algorithm for wireless communication systems based on PID shows considerable fluctuation and slower response speed. In contrast, the proposed algorithm’s bit error rate is almost never above the target bit error rate.

7. Conclusions

To improve the reliability of communication transmission in the presence of malicious jamming, this paper proposes a multi-parameter control anti-jamming algorithm for wireless communication systems based on LQR. Simulation results demonstrate that this algorithm enables the system to quickly restore the BER to the target value under unknown jamming conditions, showing more stable BER and faster power response speed, without requiring an awareness of the jamming patterns and behaviors. Future research could explore more complex models and algorithms by integrating machine learning and deep learning techniques to enhance system performance and adaptability.

Author Contributions

Conceptualization, H.Y., Y.N., K.Z. and K.Y.; methodology, H.Y., Y.N., K.Z. and R.G.; software, H.Y. and R.G.; validation, H.Y., Y.N. and K.Z.; formal analysis, H.Y., R.G. and K.Y.; investigation, H.Y., R.G. and K.Y.; resources, H.Y.; data curation, H.Y.; writing—original draft preparation, H.Y.; writing—review and editing, H.Y., Y.N. and K.Z.; visualization, H.Y.; supervision, H.Y.; project administration, H.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data presented in this study are not available due to privacy.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Yao, F.Q. Communication Anti-Jamming Engineering and Practice, 2nd ed.; Publishing House of Electronics Industry: Beijing, China, 2012. [Google Scholar]
  2. Torrieri, D. Principles of Spread-Spectrum Communication Systems, 5th ed.; Springer: Cham, Switzerland, 2022. [Google Scholar]
  3. Jia, L.; Yao, F.; Sun, Y.; Xu, Y.; Feng, S.; Anpalagan, A. A Hierarchical Learning Solution for Anti-Jamming Stackelberg Game with Discrete Power Strategies. IEEE Wirel. Commun. Lett. 2017, 6, 818–821. [Google Scholar] [CrossRef]
  4. Wang, X.; Wang, J.; Xu, Y.; Chen, J.; Jia, L.; Liu, X.; Yang, Y. Dynamic Spectrum Anti-Jamming Communications: Challenges and Opportunities. IEEE Commun. Mag. 2020, 58, 79–85. [Google Scholar] [CrossRef]
  5. Pirayesh, H.; Zeng, H. Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2022, 24, 767–809. [Google Scholar] [CrossRef]
  6. Kaelbling, L.P.; Littman, M.L.; Moore, A.W. Reinforcement Learning: A Survey. J. Artif. Intell. Res. 1996, 4, 237–285. [Google Scholar] [CrossRef]
  7. Zhou, Q.; Li, Y.; Niu, Y. A Countermeasure against Random Pulse Jamming in Time Domain Based on Reinforcement Learning. IEEE Access 2020, 8, 97164–97174. [Google Scholar] [CrossRef]
  8. Pourranjbar, A.; Kaddoum, G.; Ferdowsi, A.; Saad, W. Reinforcement Learning for Deceiving Reactive Jammers in Wireless Networks. IEEE Trans. Commun. 2021, 69, 3682–3697. [Google Scholar] [CrossRef]
  9. Liu, X.; Xu, Y.; Jia, L.; Wu, Q.; Anpalagan, A. Anti-Jamming Communications Using Spectrum Waterfall: A Deep Reinforcement Learning Approach. IEEE Commun. Lett. 2018, 22, 998–1001. [Google Scholar] [CrossRef]
  10. Liu, Q.; Zhai, J.W.; Zhang, Z.Z.; Zhong, S.; Xu, J. A Survey on Deep Reinforcement Learning. Chin. J. Comput. 2018, 41, 1–27. [Google Scholar] [CrossRef]
  11. Xiao, L.; Jiang, D.; Xu, D.; Zhu, H.; Zhang, Y.; Poor, H.V. Two-Dimensional Anti-Jamming Mobile Communication Based on Reinforcement Learning. IEEE Trans. Veh. Technol. 2018, 67, 9499–9512. [Google Scholar] [CrossRef]
  12. Xiao, L.; Lu, X.; Xu, T.; Wan, X.; Ji, W.; Zhang, Y. Reinforcement Learning-Based Mobile Offloading for Edge Computing against Jamming and Interference. IEEE Trans. Commun. 2020, 68, 6114–6126. [Google Scholar] [CrossRef]
  13. Setoodeh, P.; Haykin, S. Robust Transmit Power Control for Cognitive Radio. Proc. IEEE 2009, 97, 915–939. [Google Scholar] [CrossRef]
  14. Pan, S.; Zhao, X.; Liang, Y.C. Robust Power Allocation for OFDM-Based Cognitive Radio Networks: A Switched Affine Based Control Approach. IEEE Access 2017, 5, 18778–18792. [Google Scholar] [CrossRef]
  15. Song, X.; Dong, L.; Li, W. Stability Control of Multi-Parameter Adaptive Wireless Communication Systems Based on Multi-Lyapunov Function. High Technol. Lett. 2017, 23, 375–383. [Google Scholar] [CrossRef]
  16. Khatoon, S.; Gupta, D.; Das, L.K. PID and LQR Control for a Quadrotor: Modeling and Simulation. In Proceedings of the International Conference on Advances in Computing Communications and Informatics (ICACCI), Greater Noida, India, 24–27 September 2014; pp. 85–102. [Google Scholar]
  17. Kuo, B.C.; Golnaraghi, F. Automatic Control Systems, 10th ed.; Wiley: Hoboken, NJ, USA, 2017. [Google Scholar]
  18. Tong, T.T.; Song, X.Q.; Niu, Y.T.; Wang, M. Stability Control of Power Adaptation in Wireless Communication System. In Proceedings of the 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), Shenyang, China, 20–22 December 2013; pp. 287–291. [Google Scholar]
Figure 1. System model.
Figure 1. System model.
Applsci 14 08216 g001
Figure 2. Anti-jamming control model for wireless communication systems.
Figure 2. Anti-jamming control model for wireless communication systems.
Applsci 14 08216 g002
Figure 3. Bit error rate curves under several modulation schemes and LDPC codes.
Figure 3. Bit error rate curves under several modulation schemes and LDPC codes.
Applsci 14 08216 g003
Figure 4. Linear switching system.
Figure 4. Linear switching system.
Applsci 14 08216 g004
Figure 5. Optimal controller with state feedback.
Figure 5. Optimal controller with state feedback.
Applsci 14 08216 g005
Figure 6. System flowchart.
Figure 6. System flowchart.
Applsci 14 08216 g006
Figure 7. Comparison of three power control algorithms under burst jamming.
Figure 7. Comparison of three power control algorithms under burst jamming.
Applsci 14 08216 g007
Figure 8. Comparison of output variations with weight changes for power control algorithms under periodic pulse jamming.
Figure 8. Comparison of output variations with weight changes for power control algorithms under periodic pulse jamming.
Applsci 14 08216 g008
Figure 9. Comparison of different algorithms under random pulse jamming for systems with and without the implemented switching mechanism.
Figure 9. Comparison of different algorithms under random pulse jamming for systems with and without the implemented switching mechanism.
Applsci 14 08216 g009
Table 1. Overview of the advantages and disadvantages of existing algorithms.
Table 1. Overview of the advantages and disadvantages of existing algorithms.
ReferencesApplication ScenariosAdvantagesDisadvantages
[6,7,8,9]Single-domain or simple multi-domain anti-jamming scenariosNo prior knowledge of jamming required, low complexitySlow convergence, limited decision-making space
[10,11,12]Complex anti-jamming scenariosNo prior knowledge of jamming required, supports discrete actions and high-dimensional state spacesSlow convergence, high complexity
[14,15]Conventional jammingFast convergence, strong robustnessLimited generalizability, ineffective against unknown malicious jamming
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yao, H.; Niu, Y.; Zhang, K.; Ge, R.; Yu, K. Multi-Parameter Control Anti-Jamming Algorithm for Wireless Communication Systems Based on Linear–Quadratic Regulator. Appl. Sci. 2024, 14, 8216. https://doi.org/10.3390/app14188216

AMA Style

Yao H, Niu Y, Zhang K, Ge R, Yu K. Multi-Parameter Control Anti-Jamming Algorithm for Wireless Communication Systems Based on Linear–Quadratic Regulator. Applied Sciences. 2024; 14(18):8216. https://doi.org/10.3390/app14188216

Chicago/Turabian Style

Yao, Hang, Yingtao Niu, Kai Zhang, Rong Ge, and Kefeng Yu. 2024. "Multi-Parameter Control Anti-Jamming Algorithm for Wireless Communication Systems Based on Linear–Quadratic Regulator" Applied Sciences 14, no. 18: 8216. https://doi.org/10.3390/app14188216

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop