Preventing malicious nodes in ad hoc networks using reinforcement learning

被引:8
|
作者
Maneenil, K [1 ]
Usaha, W [1 ]
机构
[1] Suranaree Univ Technol, Sch Telecommun Engn, Nakhon Ratchasima 30000, Thailand
关键词
reputation; network security; malicious nodes; mobile ad hoc networks; reinforcement learning;
D O I
10.1109/ISWCS.2005.1547706
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper proposes an enhancement to an existing reputation method for indicating and avoiding malicious hosts in wireless ad hoc networks. The proposed method combines a simple reputation scheme with a reinforcement learning technique called the on-policy Monte Carlo method where each mobile host distributedly learns a good policy for selecting neighboring nodes in a path search. Simulation results show that the reputation scheme combined with the reinforcement learning can achieve up to 89% and 29% increase in throughput over the reputation only scheme for the static and dynamic topology case, respectively.
引用
收藏
页码:289 / 292
页数:4
相关论文
共 50 条
  • [1] Identifying malicious nodes in mobile ad hoc networks using a reputation scheme based on reinforcement learning
    Usaha, Wipawee
    Maneenil, Karnkamon
    TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 1831 - +
  • [2] Using reputations in ad hoc networks to counter malicious nodes
    Dewan, P
    Dasgupta, P
    Bhattacharya, A
    TENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 2004, : 665 - 672
  • [3] Detecting and isolating malicious nodes in wireless ad hoc networks
    Li, Fanzhi
    Jassim, Sabah
    MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
  • [4] Advanced detection of selfish or malicious nodes in ad hoc networks
    Kargl, F
    Klenk, A
    Schlott, S
    Weber, M
    SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 152 - 165
  • [5] Crosscheck mechanism to identify malicious nodes in ad hoc networks
    Su, Xu
    Boppana, Rajendra V.
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (01) : 45 - 54
  • [6] Reducing Malicious Behavior of Mobile Nodes in Ad Hoc Networks
    Rizvi, Syed S.
    Edla, Varsha
    Poudyal, Saroj
    Nepal, Ravi
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 526 - 531
  • [7] Lightweight Detection of Malicious Nodes in Mobile Ad Hoc Networks
    Rahman, Mohsin Ur
    Abbas, Sohail
    Latif, Seemab
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 191 - 194
  • [8] An efficient scheme for detecting malicious nodes in mobile ad hoc networks
    Choi, Jongoh
    Cha, Si-Ho
    Song, JooSeok
    Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 179 - 193
  • [9] An Approach towards Identification of Malicious Nodes in Mobile Ad Hoc Networks
    Thakurta, Parag Kumar Guha
    Sett, Sujoy
    2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) 2015, 2015, : 1016 - 1019
  • [10] Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks
    Khan, Uzma
    Agrawal, Shikha
    Silakari, Sanjay
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 965 - 972