Preventing malicious nodes in ad hoc networks using reinforcement learning

被引:8
|
作者
Maneenil, K [1 ]
Usaha, W [1 ]
机构
[1] Suranaree Univ Technol, Sch Telecommun Engn, Nakhon Ratchasima 30000, Thailand
关键词
reputation; network security; malicious nodes; mobile ad hoc networks; reinforcement learning;
D O I
10.1109/ISWCS.2005.1547706
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper proposes an enhancement to an existing reputation method for indicating and avoiding malicious hosts in wireless ad hoc networks. The proposed method combines a simple reputation scheme with a reinforcement learning technique called the on-policy Monte Carlo method where each mobile host distributedly learns a good policy for selecting neighboring nodes in a path search. Simulation results show that the reputation scheme combined with the reinforcement learning can achieve up to 89% and 29% increase in throughput over the reputation only scheme for the static and dynamic topology case, respectively.
引用
收藏
页码:289 / 292
页数:4
相关论文
共 50 条
  • [31] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Adnan Ahmed
    Kamalrulnizam Abu Bakar
    Muhammad Ibrahim Channa
    Khalid Haseeb
    Abdul Waheed Khan
    Frontiers of Computer Science, 2015, 9 : 280 - 296
  • [32] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Adnan AHMED
    Kamalrulnizam ABU BAKAR
    Muhammad Ibrahim CHANNA
    Khalid HASEEB
    Abdul Waheed KHAN
    Frontiers of Computer Science, 2015, 9 (02) : 280 - 296
  • [33] Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
    Raza, Imran
    Hussain, S. A.
    COMPUTER COMMUNICATIONS, 2008, 31 (09) : 1796 - 1802
  • [34] Malicious Power Allocation in Wireless Ad Hoc Networks
    Zhang, Xue
    Gong, Haigang
    Liu, Ming
    2014 WORLD SYMPOSIUM ON COMPUTER APPLICATIONS & RESEARCH (WSCAR), 2014,
  • [35] A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior
    Alkhalidy, Muhsen
    Al-Serhan, Atalla Fahed
    Alsarhan, Ayoub
    Igried, Bashar
    FUTURE INTERNET, 2022, 14 (08):
  • [36] PROTECTING PACKETS AGAINST MALICIOUS NODES IN MOBILE AD HOC NETWORK
    Devi
    Jayakumar
    IIOAB JOURNAL, 2016, 7 (09) : 64 - 68
  • [37] Robust routing in malicious environment for ad hoc networks
    Yu, ZC
    Seng, CY
    Jiang, T
    Wu, X
    Arbaugh, WA
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 36 - 47
  • [38] Trust-oriented peered customized mechanism for malicious nodes isolation for flying ad hoc networks
    Buksh, Waqas
    Guo, Ying
    Iqbal, Saleem
    Qureshi, Kashif Naseer
    Lloret, Jaime
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
  • [39] Routing in Mobile Ad-Hoc Networks as a Reinforcement Learning Task
    Chettibi, Saloua
    Chikhi, Salim
    NETWORKED DIGITAL TECHNOLOGIES, 2011, 136 : 128 - 135
  • [40] Optimized Reinforcement Learning for Resource Allocation in Vehicular Ad Hoc Networks
    Mande, Spandana
    Ramachandran, Nandhakumar
    Begum, Shaik Salma Asiya
    Moreira, Fernando
    IEEE ACCESS, 2024, 12 : 167040 - 167048