{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T09:37:02Z","timestamp":1777109822894,"version":"3.51.4"},"reference-count":29,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T00:00:00Z","timestamp":1673308800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61871133"],"award-info":[{"award-number":["61871133"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2020H6006"],"award-info":[{"award-number":["2020H6006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Industry-Academia Collaboration Program of Fujian Universities","award":["61871133"],"award-info":[{"award-number":["61871133"]}]},{"name":"Industry-Academia Collaboration Program of Fujian Universities","award":["2020H6006"],"award-info":[{"award-number":["2020H6006"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The paper studies the secrecy communication threatened by a single eavesdropper in Energy Harvesting (EH)-based cognitive radio networks, where both the Secure User (SU) and the jammer harvest, store, and utilize RF energy from the Primary Transmitter (PT). Our main goal is to optimize the time slots for energy harvesting and wireless communication for both the secure user as well as the jammer to maximize the long-term performance of secrecy communication. A multi-agent Deep Reinforcement Learning (DRL) method is proposed for solving the optimization of resource allocation and performance. Specifically, each sub-channel from the Secure Transmitter (ST) to the Secure Receiver (SR) link, along with the jammer to the eavesdropper link, is regarded as an agent, which is responsible for exploring optimal power allocation strategy while a time allocation network is established to obtain optimal EH time allocation strategy. Every agent dynamically interacts with the wireless communication environment. Simulation results demonstrate that the proposed DRL-based resource allocation method outperforms the existing schemes in terms of secrecy rate, convergence speed, and the average number of transition steps.<\/jats:p>","DOI":"10.3390\/s23020807","type":"journal-article","created":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T04:59:58Z","timestamp":1673413198000},"page":"807","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Deep Reinforcement Learning for Physical Layer Security Enhancement in Energy Harvesting Based Cognitive Radio Networks"],"prefix":"10.3390","volume":"23","author":[{"given":"Ruiquan","family":"Lin","sequence":"first","affiliation":[{"name":"College of Electrical Engineering and Automation, Fuzhou University, Fuzhou 350108, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hangding","family":"Qiu","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering and Automation, Fuzhou University, Fuzhou 350108, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weibin","family":"Jiang","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering and Automation, Fuzhou University, Fuzhou 350108, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhenglong","family":"Jiang","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering and Automation, Fuzhou University, Fuzhou 350108, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhili","family":"Li","sequence":"additional","affiliation":[{"name":"College of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jun","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering and Automation, Fuzhou University, Fuzhou 350108, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1109\/TCCN.2021.3130968","article-title":"Secrecy Outage Analysis of CR-SWIPT Networks With Artificial Noise and Spatially Random Secondary Terminals","volume":"8","author":"Ma","year":"2022","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"4709","DOI":"10.1109\/TCOMM.2020.2992471","article-title":"Performance Analysis of Overlay Cognitive NOMA Systems With Imperfect Successive Interference Cancellation","volume":"68","author":"Luo","year":"2020","journal-title":"IEEE Trans. Commun."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"7142","DOI":"10.1109\/JSEN.2022.3156088","article-title":"A Radio Frequency Energy Harvesting-Based Multihop Clustering Routing Protocol for Cognitive Radio Sensor Networks","volume":"22","author":"Wang","year":"2022","journal-title":"IEEE Sens. J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"17354","DOI":"10.1109\/ACCESS.2019.2894962","article-title":"Green Energy Powered Cognitive Sensor Network With Cooperative Sensing","volume":"7","author":"Hu","year":"2019","journal-title":"IEEE Access."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3930","DOI":"10.1109\/JSEN.2019.2958966","article-title":"Joint Resource Allocation and Transmission Mode Selection Using a POMDP-Based Hybrid Half-Duplex\/Full-Duplex Scheme for Secrecy Rate Maximization in Multi-Channel Cognitive Radio Networks","volume":"20","author":"Thanh","year":"2020","journal-title":"IEEE Sens. J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/TCCN.2021.3114176","article-title":"Secure and Energy Efficient Transmission for IRS-Assisted Cognitive Radio Networks","volume":"8","author":"Wu","year":"2022","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1331","DOI":"10.1109\/TVT.2017.2756877","article-title":"Wireless Powered Cooperative Jamming for Secure OFDM System","volume":"67","author":"Zhang","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"4245","DOI":"10.1109\/JIOT.2021.3103391","article-title":"UAV-Aided Energy-Efficient Edge Computing Networks: Security Offloading Optimization","volume":"9","author":"Gu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"825","DOI":"10.1109\/TIFS.2016.2636091","article-title":"Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks","volume":"12","author":"Xu","year":"2017","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1109\/TVT.2021.3127321","article-title":"On Securing Cognitive Radio Networks-Enabled SWIPT Over Cascaded \u03ba-\u03bc Fading Channels with Multiple Eavesdroppers","volume":"71","author":"Tashman","year":"2022","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1109\/TWC.2016.2633336","article-title":"Robust Resource Allocation to Enhance Physical Layer Security in Systems with Full-Duplex Receivers: Active Adversary","volume":"16","author":"Abedi","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"10915","DOI":"10.1109\/JIOT.2019.2943377","article-title":"Secure Transmission for SWIPT IoT Systems with Full-Duplex IoT Devices","volume":"6","author":"Xu","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"5115","DOI":"10.1109\/TVT.2020.2979267","article-title":"Energy Aware Relay Selection Improves Security-Reliability Tradeoff in Energy Harvesting Cooperative Cognitive Radio Systems","volume":"69","author":"Yan","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"11274","DOI":"10.1109\/TVT.2018.2868902","article-title":"Physical Layer Security in Overlay Cognitive Radio Networks with Energy Harvesting","volume":"67","author":"Li","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"3890","DOI":"10.1109\/TCOMM.2019.2904258","article-title":"The Security\u2013Reliability Tradeoff of Multiuser Scheduling-Aided Energy Harvesting Cognitive Radio Networks","volume":"67","author":"Ding","year":"2019","journal-title":"IEEE Trans. Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"7094","DOI":"10.1109\/JSEN.2022.3154801","article-title":"Outage Energy Efficiency Maximization for UAV-Assisted Energy Harvesting Cognitive Radio Networks","volume":"22","author":"Xiao","year":"2022","journal-title":"IEEE Sens. J."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"17618","DOI":"10.1109\/ACCESS.2017.2719704","article-title":"Resource Allocation in Wireless Powered Cognitive Radio Networks Based on a Practical Non-Linear Energy Harvesting Model","volume":"5","author":"Wang","year":"2017","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"918","DOI":"10.1109\/JSAC.2018.2824622","article-title":"Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT","volume":"36","author":"Zhou","year":"2018","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1109\/JSAC.2019.2959185","article-title":"GAN Powered Deep Distributional Reinforcement Learning for Resource Management in Network Slicing","volume":"38","author":"Hua","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"33169","DOI":"10.1109\/ACCESS.2021.3061406","article-title":"Q-Learning-Based Power Allocation for Secure Wireless Communication in UAV-Aided Relay Network","volume":"9","author":"Alnagar","year":"2021","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"11599","DOI":"10.1109\/TVT.2020.3014788","article-title":"UAV Enabled Secure Communications by Multi-Agent Deep Reinforcement Learning","volume":"69","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Fu, F., Jiao, Q., Yu, F.R., Zhang, Z., and Du, J. (2021, January 14\u201323). Securing UAV-to-Vehicle Communications: A Curiosity-Driven Deep Q-learning Network (C-DQN) Approach. Proceedings of the 2021 IEEE International Conference on Communications Workshops (ICC Workshops), Montreal, QC, Canada.","DOI":"10.1109\/ICCWorkshops50388.2021.9473714"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"4447","DOI":"10.1109\/ACCESS.2020.3048021","article-title":"Intelligent Trajectory Design for Secure Full- Duplex MIMO-UAV Relaying Against Active Eavesdroppers: A Model-Free Reinforcement Learning Approach","volume":"9","author":"Mamaghani","year":"2020","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/TIFS.2014.2384392","article-title":"Security Aware Max\u2013Min Resource Allocation in Multiuser OFDMA Downlink","volume":"10","author":"Karachontzitis","year":"2015","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"3298","DOI":"10.1109\/TVT.2021.3062283","article-title":"UAV-Assisted Secure Communications in Terrestrial Cognitive Radio Networks: Joint Power Control and 3D Trajectory Optimization","volume":"70","author":"Nguyen","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1266","DOI":"10.1109\/TCCN.2021.3074909","article-title":"A PHY Layer Security of a Jamming-Based Underlay Cognitive Satellite-Terrestrial Network","volume":"7","author":"Bouabdellah","year":"2021","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"25463","DOI":"10.1109\/ACCESS.2018.2831240","article-title":"Intelligent Power Control for Spectrum Sharing in Cognitive Radios: A Deep Reinforcement Learning Approach","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2642","DOI":"10.1109\/TCOMM.2017.2783628","article-title":"Power Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH Circuit","volume":"66","author":"Boshkovska","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"3476","DOI":"10.1109\/JIOT.2020.3022861","article-title":"Deep-Reinforcement-Learning-Based Spectrum Resource Management for Industrial Internet of Things","volume":"8","author":"Shi","year":"2021","journal-title":"IEEE Internet Things J."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/2\/807\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:05:55Z","timestamp":1760119555000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/2\/807"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,10]]},"references-count":29,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,1]]}},"alternative-id":["s23020807"],"URL":"https:\/\/doi.org\/10.3390\/s23020807","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,10]]}}}