Optimal Node Selection for Hybrid Attack in Underwater Acoustic Sensor Networks: A Virtual Expert-Guided Bandit Algorithm

被引:22
作者
Li, Xinbin [1 ]
Zhou, Yi [1 ]
Yan, Lei [1 ]
Zhao, Haihong [1 ]
Yan, Xiaodong [1 ]
Luo, Xi [1 ]
机构
[1] Yanshan Univ, Inst Elect Engn, Qinhuangdao 066004, Hebei, Peoples R China
关键词
Network attack; learning algorithm; multi armed bandit; underwater acoustic sensor networks; DIFFERENTIAL EVOLUTION;
D O I
10.1109/JSEN.2019.2945803
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this study, adversarial graph bandit theory is used to rapidly select the optimal attack node in underwater acoustic sensor networks (UASNs) with unknown topology. To ensure the flexibility and elusiveness of underwater attack, we propose a bandit-based hybrid attack mode that combines active jamming and passive eavesdropping. We also present a virtual expert-guided online learning algorithm to select the optimal node without priori topology information and complex calculation. The virtual expert mechanism is proposed to guide the algorithm learning. The expert establishes a virtual topology configuration, which addresses the blind exploration and energy consumption of attackers to a large extent. With the acoustic broadcast characteristic, we also put forward an expert self-updating method to follow the changes of real networks. This method enables the algorithm to commendably adapt to the dynamic environments. Simulation results verify the strong adaptability and robustness of the proposed algorithm.
引用
收藏
页码:1679 / 1687
页数:9
相关论文
共 29 条
[1]  
Akyildiz I. F., 2005, Ad Hoc Networks, V3, P257, DOI 10.1016/j.adhoc.2005.01.004
[2]   NONSTOCHASTIC MULTI-ARMED BANDITS WITH GRAPH-STRUCTURED FEEDBACK [J].
Alon, Noga ;
Cesa-Bianchi, Nicolo ;
Gentile, Claudio ;
Mannor, Shie ;
Mansour, Yishay ;
Shamir, Ohad .
SIAM JOURNAL ON COMPUTING, 2017, 46 (06) :1785-1826
[3]  
Amuru S., 2016, IEEE T COGN COMMUN, V1, P435
[4]   Jamming Bandits-A Novel Learning Method for Optimal Jamming [J].
Amuru, SaiDhiraj ;
Tekin, Cem ;
van der Schaar, Mihaela ;
Buehrer, R. Michael .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (04) :2792-2808
[5]  
Auer P, 2003, SIAM J COMPUT, V32, P48, DOI 10.1137/S0097539701398375
[6]   Assessing and Safeguarding Network Resilience to Nodal Attacks [J].
Chen, Pin-Yu ;
Hero, Alfred O., III .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (11) :138-143
[7]   Underwater Wireless Sensor Networks: A New Challenge for Topology Control-Based Systems [J].
Coutinho, Rodolfo W. L. ;
Boukerche, Azzedine ;
Vieira, Luiz F. M. ;
Loureiro, Antonio A. F. .
ACM COMPUTING SURVEYS, 2018, 51 (01)
[8]   Performance modeling and analysis of void-handling methodologies in underwater wireless sensor networks [J].
Coutinho, Rodolfo W. L. ;
Boukerche, Azzedine ;
Vieira, Luiz F. M. ;
Loureiro, Antonio A. F. .
COMPUTER NETWORKS, 2017, 126 :1-14
[9]   Underwater Sensor Networks: A New Challenge for Opportunistic Routing Protocols [J].
Darehshoorzadeh, Amir ;
Boukerche, Azzedine .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (11) :98-107
[10]   Differential Evolution: A Survey of the State-of-the-Art [J].
Das, Swagatam ;
Suganthan, Ponnuthurai Nagaratnam .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2011, 15 (01) :4-31