Preventing malicious nodes in ad hoc networks using reinforcement learning

被引:8
作者
Maneenil, K [1 ]
Usaha, W [1 ]
机构
[1] Suranaree Univ Technol, Sch Telecommun Engn, Nakhon Ratchasima 30000, Thailand
来源
2ND INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATIONS SYSTEMS 2005 (ISWCS 2005) | 2005年
关键词
reputation; network security; malicious nodes; mobile ad hoc networks; reinforcement learning;
D O I
10.1109/ISWCS.2005.1547706
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper proposes an enhancement to an existing reputation method for indicating and avoiding malicious hosts in wireless ad hoc networks. The proposed method combines a simple reputation scheme with a reinforcement learning technique called the on-policy Monte Carlo method where each mobile host distributedly learns a good policy for selecting neighboring nodes in a path search. Simulation results show that the reputation scheme combined with the reinforcement learning can achieve up to 89% and 29% increase in throughput over the reputation only scheme for the static and dynamic topology case, respectively.
引用
收藏
页码:289 / 292
页数:4
相关论文
共 8 条
  • [1] A test-bed for misbehavior detection in mobile ad-hoc networks -: How much can watchdogs really do?
    Buchegger, S
    Tissières, C
    Le Boudec, JY
    [J]. SIXTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2004, : 102 - 111
  • [2] BUCHEGGER S, 2003, P WIOPT 03 MOD OPT M
  • [3] Dewan P, 2004, TENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, P665
  • [4] Trusting routers and relays in ad hoc networks
    Dewan, P
    Dasgupta, P
    [J]. 2003 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2003, : 351 - 358
  • [5] SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks
    He, Q
    Wu, DP
    Khosla, P
    [J]. 2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 825 - 830
  • [6] Identity crisis: Anonymity vs. reputation in P2P systems
    Marti, S
    Garcia-Molina, H
    [J]. THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 134 - 141
  • [7] Sutton R. S., 1998, Reinforcement Learning: An Introduction, V22447
  • [8] YAU PW, 2003, 1 WORKSH 26 28 OCT 2, P130