Next Article in Journal
Design of High-Power Solid-State Transformers with Grain-Oriented Electrical Steel Cores
Previous Article in Journal
A Hierarchical Random Graph Efficient Sampling Algorithm Based on Improved MCMC Algorithm
 
 
Article
Peer-Review Record

Anti-Jamming Path Selection Method in a Wireless Communication Network Based on Dyna-Q

Electronics 2022, 11(15), 2397; https://doi.org/10.3390/electronics11152397
by Guoliang Zhang 1, Yonggui Li 1, Yingtao Niu 1,* and Quan Zhou 2
Reviewer 1:
Reviewer 2:
Electronics 2022, 11(15), 2397; https://doi.org/10.3390/electronics11152397
Submission received: 16 June 2022 / Revised: 29 July 2022 / Accepted: 29 July 2022 / Published: 31 July 2022
(This article belongs to the Section Networks)

Round 1

Reviewer 1 Report

Congratulations to the authors for submitted a technical publication in the MDPI electronics. Great effort!

 

Following are few of the comments that may assist authors to further improve the quality of the great contribution:

1. Please rephrase this sentence, " Aiming at establishing the optimal transmission path in wireless communication network 10 under malicious jamming environment efficiently," It is two long to understand for a common reader.

 

2. Please break large sentences into two or more instead of using several punctuations. for example, "When Q table updates, the algorithm can accelerate the updating of Q table 14 based on previous experience, so that the Q table converges to the optimal value quickly, which is 15 beneficial to the optimization selection of subsequent nodes.". Similarly, please find other sentences.

 

3. Please cite and state the following publications. Following publications claim to provide security whilst using the relay-selection scheme. Similarly, please find other citations and compare it with your scheme to provide reason for prioratizing the proposed algorithm.

1. "R. Khan, D. N. K. Jayakody, “Full Duplex Component-Forward Cooperative Communication for a Secure Wireless Communication System,” MDPI Electronics, DOI: 10.3390/electronics9122102"

2. Do, Dinh-Thuan, Minh-Sang Van Nguyen, Thi-Anh Hoang, and Miroslav Voznak. "NOMA-assisted multiple access scheme for IoT deployment: Relay selection model and secrecy performance improvement." Sensors 19, no. 3 (2019): 736.

The contribution of the paper needs improvement. What motivated authors to design the proposed scheme? what other methods can be used? Why specifically the proposed scheme is better? Can this scheme further improved? How? Any example with results? Please consider each of the above questions to improve the contribution of the paper.

 

Motivation of the authors is not clear

This statement does not sounds right. Wireless communication does not always have N nodes, "In a wireless communication network, there are N communication nodes".

 

Again, this statement is not right, ", which are connected by several non-interfering wireless communication links". There is no guarantee of non-interfering communication links

 

Authors may need to ask an expert of wireless communication to check for the technical errors in the paper. Main authors does not seem to be an expert of the wireless communication as per the basic technically wrong sentences present in the article.

Authors mentioned that Compared with Q learning, Dyna-Q algorithm can find the optimal path faster. How do you measure the speed? Please elaborate and show evidence.

In the system model, authors have to specify that the following are the assumptions of this article.

 

Section 3 needs to be written again. It is not clear at all. 

Please improve figure 3 to show how this works, nothing is clear with the figure.

Please explain the communication of Q-learning and equation 7.

 

How exactly the quad is obtained? Please elaborate

Where is Q table? Please provide it and explain its use.

Please state parameters used in the paper in the form of a table which are used for the simulation. 

It is not clear why authors have simulated results with respect to experiments instead of some dependent parameter?

If it is necessary to show the results with respect to number of experiments, then please also show with respect to the dependent quantity and then compared it with the number of experiments.

Authors need to increase the size of all of the figures in the article. All of them! Please increase the graphical size and font size. Font size should be same as the size of rest of the text in the article.

Authors need to cite latest and relevant publications. Most of the publications are from 2000s. Please cite the following latest publications relevant to the topic.

i. Guo, Li, Zhiliang Zhu, Francis CM Lau, Yuli Zhao, and Hai Yu. "Joint Security and Energy-Efficient Cooperative Architecture for 5G Underlaying Cellular Networks." Symmetry 14, no. 6 (2022): 1160.

ii. Khan, Rabia, Nyasha Tsiga, and Rameez Asif. "Interference management with reflective in-band full-duplex NOMA for secure 6G wireless communication systems." Sensors 22, no. 7 (2022): 2508.

iii. Guo, Ruijie, Chunling Fu, Yong Jin, Zhentao Hu, and Lin Zhou. "Robust Security Beamforming for SWIPT-Assisted Relay System with Channel Uncertainty." Sensors 22, no. 1 (2022): 370.

iv. Sarma, Subhra Sankha, Ranjay Hazra, and Peter Han Joo Chong. "Performance Analysis of DF Relay-Assisted D2D Communication in a 5G mmWave Network." Future Internet 14, no. 4 (2022): 101.

v. Sodhro, Ali Hassan, Charlotte Sennersten, and Awais Ahmad. "Towards Cognitive Authentication for Smart Healthcare Applications." Sensors 22, no. 6 (2022): 2101.

vi. R. Khan, P. Kumar, D. N. K. Jayakody and M. Liyanage, "A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions," in IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 196-248, Firstquarter 2020

vii. Do, Dinh-Thuan, Minh-Sang Van Nguyen, Thi-Anh Hoang, and Miroslav Voznak. "NOMA-assisted multiple access scheme for IoT deployment: Relay selection model and secrecy performance improvement." Sensors 19, no. 3 (2019): 736.

viii. R. Khan, R. Asif, “Reflective In-Band Full Duplex NOMA Communications for Secure 5G Networks”, IEEE, The 2021 International Conference on Smart Applications, Communications and Networking (SmartNets), Glasgow, Scotland, UK Sep 22-24, 2021, pp. 1-6

ix. Zhang, Qin, Yikai Liu, Xiaosong Yu, Yongli Zhao, and Jie Zhang. "Topology-Abstraction-Based Protection Scheme in Quantum Key Distribution Networks with Partially Trusted Relays." In Photonics, vol. 9, no. 4, p. 239. MDPI, 2022.

Author Response

Thank you for your comment!I have revised my paper

Author Response File: Author Response.pdf

Reviewer 2 Report

A routing scheme, named Dyna-Q, is presented in this article as a remedy to the jamming attack in WSNs.

Simulations demonstrate the superiority of stand Q-Learning and the MAB proposed in 2019.

Quality of illustration needs to be improved.

The philosophy of Equation (5)?

Please highlight the difference between Dyna-Q and Q-Learning and how it contributes to the improved performance.

The scope of literature review should be extended, such as trust-based routing and so forth.

A more comprehensive (more recent subjects) comparative study will make this work more persuasive.

Author Response

Thank you for your comment!I have revised my paper.

Author Response File: Author Response.pdf

Round 2

Reviewer 2 Report

The majority of issues in the 1st review had been addresses. 

I believe that the work now meets the requirement of Electronics and can be accepted for publish.

Author Response

 Thank you for your comment. I will describe the algorithm more fully.

Author Response File: Author Response.docx

Back to TopTop