Identifying malicious nodes in mobile ad hoc networks using a reputation scheme based on reinforcement learning

被引:0
|
作者
Usaha, Wipawee [1 ]
Maneenil, Karnkamon [1 ]
机构
[1] Suranaree Univ Technol, Sch Telecommun Engn, Nakhon Ratchasima 30000, Thailand
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a reputation mechanism that selects trustworthy nodes for forwarding packets in mobile ad hoc networks (MANETs). The proposed method combines an existing reputation scheme with a reinforcement learning technique called the on-policy Monte Carlo (ONMC) method in the node selection process during the execution of a path search. The objective is to find a decision rule for selecting neighboring nodes which maximizes the long-term average reward. This paper extends a recent work by employing a finite buffer M/M/1/K queuing model to produce packet drops that in turn characterize the reputation values at each node in the MANET. Simulation results show that the proposed scheme can achieve up to 71% and 61% increase in throughput over the existing reputation scheme under both static and dynamic topology cases, respectively.
引用
收藏
页码:1831 / +
页数:2
相关论文
共 50 条
  • [1] Preventing malicious nodes in ad hoc networks using reinforcement learning
    Maneenil, K
    Usaha, W
    [J]. 2ND INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATIONS SYSTEMS 2005 (ISWCS 2005), 2005, : 289 - 292
  • [2] An efficient scheme for detecting malicious nodes in mobile ad hoc networks
    Choi, Jongoh
    Cha, Si-Ho
    Song, JooSeok
    [J]. Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 179 - 193
  • [3] A Reputation-based Scheme against Malicious Packet Dropping for Mobile Ad Hoc Networks
    Song JianHua
    Ma ChuanXiang
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 3, 2009, : 113 - 117
  • [4] Identifying Malicious Nodes in Mobile Ad-Hoc Networks using Polynomial Reduction Algorithm
    Varma, D. Arvind
    Narayanan, M.
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1179 - 1184
  • [5] Counteracting Selfish Nodes Using Reputation Based System in Mobile Ad Hoc Networks
    Fayaz, Muhammad
    Mehmood, Gulzar
    Khan, Ajab
    Abbas, Sohail
    Fayaz, M.
    Gwak, Jeonghwan
    [J]. ELECTRONICS, 2022, 11 (02)
  • [6] Reducing Malicious Behavior of Mobile Nodes in Ad Hoc Networks
    Rizvi, Syed S.
    Edla, Varsha
    Poudyal, Saroj
    Nepal, Ravi
    [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 526 - 531
  • [7] Lightweight Detection of Malicious Nodes in Mobile Ad Hoc Networks
    Rahman, Mohsin Ur
    Abbas, Sohail
    Latif, Seemab
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 191 - 194
  • [8] An Approach towards Identification of Malicious Nodes in Mobile Ad Hoc Networks
    Thakurta, Parag Kumar Guha
    Sett, Sujoy
    [J]. 2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) 2015, 2015, : 1016 - 1019
  • [9] A reputation-based service differentiation scheme for mobile ad hoc networks
    Denko, MK
    [J]. WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 197 - 204
  • [10] A Reputation Management Scheme for Identifying Malicious Nodes in VANET
    Gong, Changhui
    Xu, Changgiao
    Zhou, Zan
    Zhang, Tao
    Yang, Shulie
    [J]. 2019 IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2019,