Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks
Title | Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Ling, Mee Hong, Yau, Kok-Lim Alvin |
Conference Name | 2019 International Conference on Information Networking (ICOIN) |
Date Published | Jan. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-5386-8350-7 |
Keywords | attacks, clustering, clustering scheme, Cognitive radio, Cognitive Radio Security, discount factor, distributed cognitive radio networks, Heuristic algorithms, launch attacks, learning (artificial intelligence), learning rate, network scalability, operating region, pattern clustering, pubcrawl, radio networks, reinforcement learning, reinforcement learning model, resilience, Resiliency, Resource management, RL model, RL parameters, Scalability, security, security issues, telecommunication security, volatile environment, volatile operating environment, White spaces |
Abstract | This paper investigates the effectiveness of reinforcement learning (RL) model in clustering as an approach to achieve higher network scalability in distributed cognitive radio networks. Specifically, it analyzes the effects of RL parameters, namely the learning rate and discount factor in a volatile environment, which consists of member nodes (or secondary users) that launch attacks with various probabilities of attack. The clusterhead, which resides in an operating region (environment) that is characterized by the probability of attacks, countermeasures the malicious SUs by leveraging on a RL model. Simulation results have shown that in a volatile operating environment, the RL model with learning rate a= 1 provides the highest network scalability when the probability of attacks ranges between 0.3 and 0.7, while the discount factor g does not play a significant role in learning in an operating environment that is volatile due to attacks. |
URL | https://ieeexplore.ieee.org/document/8718163 |
DOI | 10.1109/ICOIN.2019.8718163 |
Citation Key | ling_can_2019 |
- radio networks
- White spaces
- volatile operating environment
- volatile environment
- telecommunication security
- security issues
- security
- Scalability
- RL parameters
- RL model
- resource management
- Resiliency
- resilience
- reinforcement learning model
- Reinforcement learning
- attacks
- pubcrawl
- pattern clustering
- operating region
- network scalability
- learning rate
- learning (artificial intelligence)
- launch attacks
- Heuristic algorithms
- distributed cognitive radio networks
- discount factor
- Cognitive Radio Security
- cognitive radio
- clustering scheme
- clustering