Improving Trusted Routing by Identifying Malicious Nodes in a MANET Using Reinforcement Learning

被引:0
|
作者
Mayadunna, Hansi [1 ]
De Silva, Shanen Leen [1 ]
Wedage, Iesha [1 ]
Pabasara, Sasanka [1 ]
Rupasinghe, Lakmal [1 ]
Liyanapathirana, Chethena [1 ]
Kesavan, Krishnadeva [1 ]
Nawarathna, Chamira [1 ]
Sampath, Kalpa Kalhara [1 ]
机构
[1] Sri Lanka Inst Informat Technol, Dept Informat Technol, New Kandy Rd, Malabe, Sri Lanka
来源
2017 17TH INTERNATIONAL CONFERENCE ON ADVANCES IN ICT FOR EMERGING REGIONS (ICTER) - 2017 | 2017年
关键词
MANET; Trust; Reinforcement learning; AODV;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Mobile ad-hoc networks (MANETs) are decentralized and self-organizing communication systems. They have become pervasive in the current technological framework. MANETs have become a vital solution to the services that need flexible establishments, dynamic and wireless connections such as military operations, healthcare systems, vehicular networks, mobile conferences, etc. Hence it is more important to estimate the trustworthiness of moving devices. In this research, we have proposed a model to improve a trusted routing in mobile ad-hoc networks by identifying malicious nodes. The proposed system uses Reinforcement Learning (RL) agent that learns to detect malicious nodes. The work focuses on a MANET with Ad-hoc On-demand Distance Vector (AODV) Protocol. Most of the systems were developed with the assumption of a small network with limited number of neighbours. But with the introduction of reinforcement learning concepts this work tries to minimize those limitations. The main objective of the research is to introduce a new model which has the capability to detect malicious nodes that decrease the performance of a MANET significantly. The malicious behaviour is simulated with black holes that move randomly across the network. After identifying the technology stack and concepts of RL, system design was designed and the implementation was carried out. Then tests were performed and defects and further improvements were identified. The research deliverables concluded that the proposed model arranges for highly accurate and reliable trust improvement by detecting malicious nodes in a dynamic MANET environment.
引用
收藏
页码:263 / 270
页数:8
相关论文
共 50 条
  • [1] Reputation-Based Opportunistic Routing Protocol Using Q-Learning for MANET Attacked by Malicious Nodes
    Ryu, Joonsu
    Kim, Sungwook
    IEEE ACCESS, 2023, 11 : 47701 - 47711
  • [2] Secure Checkpointing-Recovery using Trusted Nodes in MANET
    Biswas, Suparna
    Dey, Priyanka
    Neogy, Sarmistha
    2013 4TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT), 2013, : 174 - 180
  • [3] BRLR: A Routing Strategy for MANET Based on Reinforcement Learning
    Wang, Yinghe
    Tang, Yu
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1412 - 1417
  • [4] A Trusted Routing Scheme Using Blockchain and Reinforcement Learning for Wireless Sensor Networks
    Yang, Jidian
    He, Shiwen
    Xu, Yang
    Chen, Linweiya
    Ren, Ju
    SENSORS, 2019, 19 (04)
  • [5] Preventing malicious nodes in ad hoc networks using reinforcement learning
    Maneenil, K
    Usaha, W
    2ND INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATIONS SYSTEMS 2005 (ISWCS 2005), 2005, : 289 - 292
  • [6] Detecting malicious nodes using game theory and reinforcement learning in software-defined networksDetecting malicious nodes using game theory and reinforcement learning...A. Javadpour et al.
    Amir Javadpour
    Forough Ja’fari
    Tarik Taleb
    Chafika Benzaïd
    International Journal of Information Security, 2025, 24 (3)
  • [7] Identifying Malicious Node Using Trust Value in Cluster Based MANET (IMTVCM)
    Annadurai, P.
    Vijayalaksmi, S.
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 1150 - 1158
  • [8] Detecting and Avoiding of Worm Hole Attack on MANET using Trusted AODV Routing Algorithm
    Kaneria, Piyush
    Rajavat, Anand
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [9] Detecting and Avoiding of Collaborative Black hole attack on MANET using Trusted AODV Routing Algorithm
    Singh, Sushama
    Mishra, Atish
    Singh, Upendra
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [10] Detecting Malicious nodes in MANET using Rateless Codes for maximum content distribution
    Suganthi, N.
    Pari, S. Neelavathy
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 308 - 311