Visible to the public Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks

TitleCan Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks
Publication TypeConference Paper
Year of Publication2019
AuthorsLing, Mee Hong, Yau, Kok-Lim Alvin
Conference Name2019 International Conference on Information Networking (ICOIN)
Date PublishedJan. 2019
PublisherIEEE
ISBN Number978-1-5386-8350-7
Keywordsattacks, clustering, clustering scheme, Cognitive radio, Cognitive Radio Security, discount factor, distributed cognitive radio networks, Heuristic algorithms, launch attacks, learning (artificial intelligence), learning rate, network scalability, operating region, pattern clustering, pubcrawl, radio networks, reinforcement learning, reinforcement learning model, resilience, Resiliency, Resource management, RL model, RL parameters, Scalability, security, security issues, telecommunication security, volatile environment, volatile operating environment, White spaces
Abstract

This paper investigates the effectiveness of reinforcement learning (RL) model in clustering as an approach to achieve higher network scalability in distributed cognitive radio networks. Specifically, it analyzes the effects of RL parameters, namely the learning rate and discount factor in a volatile environment, which consists of member nodes (or secondary users) that launch attacks with various probabilities of attack. The clusterhead, which resides in an operating region (environment) that is characterized by the probability of attacks, countermeasures the malicious SUs by leveraging on a RL model. Simulation results have shown that in a volatile operating environment, the RL model with learning rate a= 1 provides the highest network scalability when the probability of attacks ranges between 0.3 and 0.7, while the discount factor g does not play a significant role in learning in an operating environment that is volatile due to attacks.

URLhttps://ieeexplore.ieee.org/document/8718163
DOI10.1109/ICOIN.2019.8718163
Citation Keyling_can_2019