Deep Learning Aided Power Allocation in An Energy Harvesting Untrusted Relay Network

Qiannan Qin, Rugui Yao, Yuxin Zhang, Nan Qi, Xiaoya Zuo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In an energy harvesting untrusted relay network, power allocation influences the cooperative jamming, the energy harvesting and thus the achievable secrecy rate. In our previous work, theoretical computation of power allocation is derived with high computation. To tackle this issue, in this paper, we propose a deep learning aided power allocation. We here utilize fully-connected deep neural network (FC-DNN) to predict the optimal power allocation factor, where the feature vector and the model structure are carefully designed. Simulation results show the deep learning aided power allocation achieves almost the same power allocation factor and the maximum secrecy rate as the theoretical one, which validates the correctness and accuracy of the proposed scheme. Special case with small optimal power allocation factor is simulated and analyzed in detail. Furthermore, the convergence with different learning rate and batch size is also discussed.

Original languageEnglish
Title of host publication2020 IEEE 92nd Vehicular Technology Conference, VTC 2020-Fall - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728194844
DOIs
StatePublished - Nov 2020
Event92nd IEEE Vehicular Technology Conference, VTC 2020-Fall - Virtual, Victoria, Canada
Duration: 18 Nov 2020 → …

Publication series

NameIEEE Vehicular Technology Conference
Volume2020-November
ISSN (Print)1550-2252

Conference

Conference92nd IEEE Vehicular Technology Conference, VTC 2020-Fall
Country/TerritoryCanada
CityVirtual, Victoria
Period18/11/20 → …

Keywords

  • deep neural networks (DNN)
  • energy harvesting
  • Power allocation

Fingerprint

Dive into the research topics of 'Deep Learning Aided Power Allocation in An Energy Harvesting Untrusted Relay Network'. Together they form a unique fingerprint.

Cite this