Preventing malicious nodes in ad hoc networks using reinforcement learning

被引:8
|
作者
Maneenil, K [1 ]
Usaha, W [1 ]
机构
[1] Suranaree Univ Technol, Sch Telecommun Engn, Nakhon Ratchasima 30000, Thailand
关键词
reputation; network security; malicious nodes; mobile ad hoc networks; reinforcement learning;
D O I
10.1109/ISWCS.2005.1547706
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper proposes an enhancement to an existing reputation method for indicating and avoiding malicious hosts in wireless ad hoc networks. The proposed method combines a simple reputation scheme with a reinforcement learning technique called the on-policy Monte Carlo method where each mobile host distributedly learns a good policy for selecting neighboring nodes in a path search. Simulation results show that the reputation scheme combined with the reinforcement learning can achieve up to 89% and 29% increase in throughput over the reputation only scheme for the static and dynamic topology case, respectively.
引用
收藏
页码:289 / 292
页数:4
相关论文
共 50 条
  • [41] Hierarchical Routing for Vehicular Ad Hoc Networks via Reinforcement Learning
    Li, Fan
    Song, Xiaoyu
    Chen, Huijie
    Li, Xin
    Wang, Yu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (02) : 1852 - 1865
  • [42] A Survey on Applications of Reinforcement Learning in Flying Ad-Hoc Networks
    Rezwan, Sifat
    Choi, Wooyeol
    ELECTRONICS, 2021, 10 (04) : 1 - 19
  • [43] Curriculum Reinforcement Learning for Cohesive Team in Mobile Ad Hoc Networks
    Kim, Nayoung
    Kwon, Minhae
    Park, Hyunggon
    IEEE COMMUNICATIONS LETTERS, 2022, 26 (08) : 1809 - 1813
  • [44] Detection of malicious nodes in drone ad-hoc network based on supervised learning and clustering algorithms
    Sun, Shanshan
    Ma, Zuchao
    Liu, Liang
    Gao, Hang
    Peng, Jianfei
    2020 16TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2020), 2020, : 145 - 152
  • [45] The Controversy of Selfish Nodes in Ad Hoc Networks
    Toh, C. K.
    Kim, Dongkyun
    Oh, Sutaek
    Yoo, Hongseok
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1087 - 1092
  • [46] Improving Trusted Routing by Identifying Malicious Nodes in a MANET Using Reinforcement Learning
    Mayadunna, Hansi
    De Silva, Shanen Leen
    Wedage, Iesha
    Pabasara, Sasanka
    Rupasinghe, Lakmal
    Liyanapathirana, Chethena
    Kesavan, Krishnadeva
    Nawarathna, Chamira
    Sampath, Kalpa Kalhara
    2017 17TH INTERNATIONAL CONFERENCE ON ADVANCES IN ICT FOR EMERGING REGIONS (ICTER) - 2017, 2017, : 263 - 270
  • [47] Preventing selfish behavior in ad hoc networks
    Seredynski, M.
    Bouvry, P.
    Klopotek, M. A.
    2007 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-10, PROCEEDINGS, 2007, : 3554 - +
  • [48] Detecting malicious nodes using game theory and reinforcement learning in software-defined networksDetecting malicious nodes using game theory and reinforcement learning...A. Javadpour et al.
    Amir Javadpour
    Forough Ja’fari
    Tarik Taleb
    Chafika Benzaïd
    International Journal of Information Security, 2025, 24 (3)
  • [49] Trust Management Scheme for Securing Vehicular Ad Hoc Networks Against Malicious Nodes and False Message Anomaly
    Byeon, Haewon
    Seno, Mohammed E.
    Srivastava, Ajeet Kumar
    Alghamdi, Azzah
    Keshta, Ismail
    Soni, Mukesh
    Prasad, K. D. V.
    Abdurakhimova, Dilora
    Bhatt, Mohammed Wasim
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2025, 36 (04):
  • [50] Blockchain-Based Trust and Authentication Model for Detecting and Isolating Malicious Nodes in Flying Ad Hoc Networks
    Qureshi, Kashif Naseer
    Nafea, Hanaa
    Tariq Javed, Ibrahim
    Zrar Ghafoor, Kayhan
    IEEE ACCESS, 2024, 12 : 95390 - 95401