{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:21:39Z","timestamp":1760145699837,"version":"build-2065373602"},"reference-count":47,"publisher":"MDPI AG","issue":"16","license":[{"start":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T00:00:00Z","timestamp":1723593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Natural Science Foundation of China","award":["61871133","FJHYF-ZH-2023-06"],"award-info":[{"award-number":["61871133","FJHYF-ZH-2023-06"]}]},{"name":"Promoting High-Quality Development of Marine and Fishery Industry of Fujian Province","award":["61871133","FJHYF-ZH-2023-06"],"award-info":[{"award-number":["61871133","FJHYF-ZH-2023-06"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In the Energy-Harvesting (EH) Cognitive Internet of Things (EH-CIoT) network, due to the broadcast nature of wireless communication, the EH-CIoT network is susceptible to jamming attacks, which leads to a serious decrease in throughput. Therefore, this paper investigates an anti-jamming resource-allocation method, aiming to maximize the Long-Term Throughput (LTT) of the EH-CIoT network. Specifically, the resource-allocation problem is modeled as a Markov Decision Process (MDP) without prior knowledge. On this basis, this paper carefully designs a two-dimensional reward function that includes throughput and energy rewards. On the one hand, the Agent Base Station (ABS) intuitively evaluates the effectiveness of its actions through throughput rewards to maximize the LTT. On the other hand, considering the EH characteristics and battery capacity limitations, this paper proposes energy rewards to guide the ABS to reasonably allocate channels for Secondary Users (SUs) with insufficient power to harvest more energy for transmission, which can indirectly improve the LTT. In the case where the activity states of Primary Users (PUs), channel information and the jamming strategies of the jammer are not available in advance, this paper proposes a Linearly Weighted Deep Deterministic Policy Gradient (LWDDPG) algorithm to maximize the LTT. The LWDDPG is extended from DDPG to adapt to the design of the two-dimensional reward function, which enables the ABS to reasonably allocate transmission channels, continuous power and work modes to the SUs, and to let the SUs not only transmit on unjammed channels, but also harvest more RF energy to supplement the battery power. Finally, the simulation results demonstrate the validity and superiority of the proposed method compared with traditional methods under multiple jamming attacks.<\/jats:p>","DOI":"10.3390\/s24165273","type":"journal-article","created":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T03:49:36Z","timestamp":1723693776000},"page":"5273","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Anti-Jamming Resource-Allocation Method in the EH-CIoT Network through LWDDPG Algorithm"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4147-4843","authenticated-orcid":false,"given":"Fushuai","family":"Li","sequence":"first","affiliation":[{"name":"College of Electrical Engineering and Automation, Fuzhou University, Fuzhou 350108, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiawang","family":"Bao","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering and Automation, Fuzhou University, Fuzhou 350108, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jun","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering and Automation, Fuzhou University, Fuzhou 350108, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Da","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering and Automation, Fuzhou University, Fuzhou 350108, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wencheng","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering and Automation, Fuzhou University, Fuzhou 350108, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ruiquan","family":"Lin","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering and Automation, Fuzhou University, Fuzhou 350108, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2024,8,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Osama, M., Ateya, A.A., Sayed, M.S., Hammad, M., P\u0142awiak, P., Abd El-Latif, A.A., and Elsayed, R.A. (2023). Internet of Medical Things and Healthcare 4.0: Trends, Requirements, Challenges, and Research Directions. Sensors, 23.","DOI":"10.3390\/s23177435"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"4989","DOI":"10.1109\/TNSM.2022.3186725","article-title":"A Deep-Q Learning Scheme for Secure Spectrum Allocation and Resource Management in 6G Environment","volume":"19","author":"Bhattacharya","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"6954","DOI":"10.1109\/TVT.2023.3347430","article-title":"A Blockchain-Based Method to Defend against Massive SSDF Attacks in Cognitive Internet of Vehicles","volume":"73","author":"Lin","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2726","DOI":"10.1109\/TNSM.2022.3168669","article-title":"Reliability Analysis of Cognitive Radio Networks with Reserved Spectrum for 6G-IoT","volume":"19","author":"Khan","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1222","DOI":"10.1109\/COMST.2019.2962526","article-title":"Sensing, Computing, and Communications for Energy Harvesting IoTs: A Survey","volume":"22","author":"Ma","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3110","DOI":"10.1109\/TCOMM.2021.3126626","article-title":"Deep Reinforcement Learning-Based Multidimensional Resource Management for Energy Harvesting Cognitive NOMA Communications","volume":"70","author":"Shi","year":"2022","journal-title":"IEEE Trans. Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1109\/TVT.2022.3204310","article-title":"Impacts of Sensing Energy and Data Availability on Throughput of Energy Harvesting Cognitive Radio Networks","volume":"72","author":"Liu","year":"2023","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"3171","DOI":"10.1109\/LCOMM.2023.3331360","article-title":"A Fast Method to Defend against SSDF Attacks in the CIoV Network: Based on DAG Blockchain and Evolutionary Game","volume":"27","author":"Li","year":"2023","journal-title":"IEEE Commun. Lett."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"907","DOI":"10.1109\/TGCN.2021.3133305","article-title":"Improving Secrecy Rate and Social Welfare by NOMA Technique in D2D Communications Network","volume":"6","author":"Alibeigi","year":"2022","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1109\/COMST.2022.3159185","article-title":"Jamming Attacks and Anti-Jamming Strategies in Wireless Networks: A Comprehensive Survey","volume":"24","author":"Pirayesh","year":"2022","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"11262","DOI":"10.1109\/TVT.2022.3187092","article-title":"Trajectory and Transmit Power Optimization for IRS-Assisted UAV Communication under Malicious Jamming","volume":"71","author":"Ji","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"62717","DOI":"10.1109\/ACCESS.2018.2874134","article-title":"Resource Management for Cognitive IoT Systems with RF Energy Harvesting in Smart Cities","volume":"6","author":"Alzahrani","year":"2018","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3257","DOI":"10.1109\/JIOT.2018.2882207","article-title":"Wireless Information and Power Transfer for IoT Applications in Overlay Cognitive Radio Networks","volume":"6","author":"Gurjar","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"3186","DOI":"10.1109\/JIOT.2018.2880190","article-title":"Energy Efficient Resource Allocation in EH-Enabled CR Networks for IoT","volume":"6","author":"Shahini","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Mishra, N., Kundu, S., Mondal, S., and Roy, S.D. (2019, January 7\u201311). Cognitive Machine to Machine Communication with Energy Harvesting in IoT Networks. Proceedings of the 2019 11th International Conference on Communication Systems & Networks (COMSNETS), Bengaluru, India.","DOI":"10.1109\/COMSNETS.2019.8711423"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1904","DOI":"10.1109\/JIOT.2018.2817339","article-title":"Spectrum Assignment in Cognitive Radio Networks for Internet-of-Things Delay-Sensitive Applications Under Jamming Attacks","volume":"5","author":"Almajali","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Chaczko, Z., Slehar, S., and Shnoudi, T. (2018, January 26\u201328). Game-Theory Based Cognitive Radio Policies for Jamming and Anti-Jamming in the IoT. Proceedings of the 2018 12th International Symposium on Medical Information and Communication Technology (ISMICT), Sydney, Australia.","DOI":"10.1109\/ISMICT.2018.8573725"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Khadr, M.H., Bany Salameh, H., Ayyash, M., Almajali, S., and Elgala, H. (2020, January 2\u201316). Testbed Validation of Security-Aware Channel Assignment in Cognitive Radio IoT Networks. Proceedings of the 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA.","DOI":"10.1109\/WF-IoT48130.2020.9221302"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"7529","DOI":"10.1109\/JIOT.2020.2985042","article-title":"Securing Delay-Sensitive CR-IoT Networking Under Jamming Attacks: Parallel Transmission and Batching Perspective","volume":"7","author":"Salameh","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Gwon, Y., Dastangoo, S., Fossa, C., and Kung, H.T. (2013, January 14\u201316). Competing Mobile Network Game: Embracing Antijamming and Jamming Strategies with Reinforcement Learning. Proceedings of the 2013 IEEE Conference on Communications and Network Security (CNS), National Harbor, MD, USA.","DOI":"10.1109\/CNS.2013.6682689"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"177254","DOI":"10.1109\/ACCESS.2019.2937438","article-title":"Joint Power Control and Channel Allocation for Interference Mitigation Based on Reinforcement Learning","volume":"7","author":"Zhao","year":"2019","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"9499","DOI":"10.1109\/TVT.2018.2856854","article-title":"Two-Dimensional Antijamming Mobile Communication Based on Reinforcement Learning","volume":"67","author":"Xiao","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Bi, Y., Wu, Y., and Hua, C. (2019, January 20\u201324). Deep Reinforcement Learning Based Multi-User Anti-Jamming Strategy. Proceedings of the ICC 2019\u20142019 IEEE International Conference on Communications (ICC), Shanghai, China.","DOI":"10.1109\/ICC.2019.8761848"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"9175","DOI":"10.1109\/JIOT.2019.2928837","article-title":"Power Control in Energy Harvesting Multiple Access System with Reinforcement Learning","volume":"6","author":"Chu","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"5677","DOI":"10.1109\/JIOT.2020.2980586","article-title":"Deep-Reinforcement-Learning-Based Energy-Efficient Resource Management for Social and Cognitive Internet of Things","volume":"7","author":"Yang","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"5917","DOI":"10.1109\/TCOMM.2021.3087624","article-title":"No-Pain No-Gain: DRL Assisted Optimization in Energy-Constrained CR-NOMA Networks","volume":"69","author":"Ding","year":"2021","journal-title":"IEEE Trans. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1216","DOI":"10.1109\/TCCN.2022.3142727","article-title":"Deep Reinforcement Learning Optimal Transmission Algorithm for Cognitive Internet of Things with RF Energy Harvesting","volume":"8","author":"Guo","year":"2022","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"7663","DOI":"10.1109\/TWC.2020.3015260","article-title":"Cooperative Spectrum Sensing Optimization in Energy-Harvesting Cognitive Radio Networks","volume":"19","author":"Liu","year":"2020","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1109\/TWC.2019.2946813","article-title":"Total Throughput Maximization of Cooperative Cognitive Radio Networks with Energy Harvesting","volume":"19","author":"Zheng","year":"2020","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1109\/TCOMM.2022.3221422","article-title":"DDPG-Based Joint Time and Energy Management in Ambient Backscatter-Assisted Hybrid Underlay CRNs","volume":"71","author":"Zheng","year":"2023","journal-title":"IEEE Trans. Commun."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1078","DOI":"10.1109\/LWC.2024.3360235","article-title":"Fight Against Intelligent Reactive Jammer in MEC Networks: A Hierarchical Reinforcement Learning-Based Hybrid Hidden Strategy","volume":"13","author":"Liu","year":"2024","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"8013","DOI":"10.1109\/TCOMM.2021.3111617","article-title":"Two Birds with One Stone: Simultaneous Jamming and Eavesdropping with the Bayesian\u2013Stackelberg Game","volume":"69","author":"Qi","year":"2021","journal-title":"IEEE Trans. Commun."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/LWC.2024.3355322","article-title":"Malicious RIS Versus Massive MIMO: Securing Multiple Access against RIS-Based Jamming Attacks","volume":"13","author":"Mahmood","year":"2024","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"7114","DOI":"10.1109\/TVT.2017.2673861","article-title":"Optimal Spectrum Access and Energy Supply for Cognitive Radio Systems with Opportunistic RF Energy Harvesting","volume":"66","author":"Pratibha","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/JSAC.2020.3036962","article-title":"Multi-Agent Reinforcement Learning Based Resource Management in MEC- and UAV-Assisted Vehicular Networks","volume":"39","author":"Peng","year":"2021","journal-title":"IEEE J. Select. Areas Commun."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"3945","DOI":"10.1109\/JIOT.2021.3101900","article-title":"Highly Reliable Transmission and Channel Assignment for CR-IoT Networks","volume":"9","author":"Halloush","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1109\/COMST.2014.2368999","article-title":"Wireless Networks with RF Energy Harvesting: A Contemporary Survey","volume":"17","author":"Lu","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2247","DOI":"10.1109\/TMC.2015.2492556","article-title":"Joint Adaptation of Frequency Hopping and Transmission Rate for Anti-Jamming Wireless Systems","volume":"15","author":"Hanawal","year":"2016","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"3717","DOI":"10.1109\/TAES.2022.3155711","article-title":"Refracting RIS-Aided Hybrid Satellite-Terrestrial Relay Networks: Joint Beamforming Design and Optimization","volume":"58","author":"Lin","year":"2022","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"11123","DOI":"10.1109\/JIOT.2021.3051603","article-title":"Supporting IoT with Rate-Splitting Multiple Access in Satellite and Aerial-Integrated Networks","volume":"8","author":"Lin","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.ipl.2006.06.003","article-title":"An Efficient Approximation for the Generalized Assignment Problem","volume":"100","author":"Cohen","year":"2006","journal-title":"Inf. Process. Lett."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MSP.2017.2743240","article-title":"Deep Reinforcement Learning: A Brief Survey","volume":"34","author":"Arulkumaran","year":"2017","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"6361","DOI":"10.1109\/TCOMM.2021.3089476","article-title":"Multi-Objective Optimization for UAV-Assisted Wireless Powered IoT Networks Based on Extended DDPG Algorithm","volume":"69","author":"Yu","year":"2021","journal-title":"IEEE Trans. Commun."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1174","DOI":"10.1109\/TCCN.2021.3120996","article-title":"Multi-Agent Reinforcement Learning-Based Distributed Dynamic Spectrum Access","volume":"8","author":"Albinsaid","year":"2022","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","article-title":"A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends","volume":"104","author":"Zou","year":"2016","journal-title":"Proc. IEEE"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TVCG.2017.2744878","article-title":"Visualizing Dataflow Graphs of Deep Learning Models in TensorFlow","volume":"24","author":"Wongsuphasawat","year":"2018","journal-title":"IEEE Trans. Visual. Comput. Graph."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"4899","DOI":"10.1109\/JIOT.2023.3300770","article-title":"Physical-Layer Security Enhancement in Energy-Harvesting-Based Cognitive Internet of Things: A GAN-Powered Deep Reinforcement Learning Approach","volume":"11","author":"Lin","year":"2024","journal-title":"IEEE Internet Things J."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/16\/5273\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:36:46Z","timestamp":1760110606000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/16\/5273"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,14]]},"references-count":47,"journal-issue":{"issue":"16","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["s24165273"],"URL":"https:\/\/doi.org\/10.3390\/s24165273","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2024,8,14]]}}}