Home > Research > Publications & Outputs > Application of reinforcement learning for secur...

Electronic data

  • Mehong-RL-c2-final

    Rights statement: This is the author’s version of a work that was accepted for publication in Applied Soft Computing. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Applied Soft Computing, 37, 2015 DOI: 10.1016/j.asoc.2015.09.017

    Accepted author manuscript, 1.08 MB, PDF document

    Available under license: CC BY-NC-ND: Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License

Links

Text available via DOI:

View graph of relations

Application of reinforcement learning for security enhancement in cognitive radio networks

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Application of reinforcement learning for security enhancement in cognitive radio networks. / Ling, Mee Hong; Yau, Kok-lim Alvin; Qadir, Junaid et al.
In: Applied Soft Computing, Vol. 37, 12.2015, p. 809-829.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Ling MH, Yau KA, Qadir J, Poh GS, Ni Q. Application of reinforcement learning for security enhancement in cognitive radio networks. Applied Soft Computing. 2015 Dec;37:809-829. Epub 2015 Sept 26. doi: 10.1016/j.asoc.2015.09.017

Author

Ling, Mee Hong ; Yau, Kok-lim Alvin ; Qadir, Junaid et al. / Application of reinforcement learning for security enhancement in cognitive radio networks. In: Applied Soft Computing. 2015 ; Vol. 37. pp. 809-829.

Bibtex

@article{865f4a1947114aedacfa4bdda3455565,
title = "Application of reinforcement learning for security enhancement in cognitive radio networks",
abstract = "Cognitive radio network (CRN) enables unlicensed users (or secondary users, SUs) to sense for and opportunistically operate in underutilized licensed channels, which are owned by the licensed users (or primary users, PUs). Cognitive radio network (CRN) has been regarded as the next-generation wireless network centered on the application of artificial intelligence, which helps the SUs to learn about, as well as to adaptively and dynamically reconfigure its operating parameters, including the sensing and transmission channels, for network performance enhancement. This motivates the use of artificial intelligence to enhance security schemes for CRNs. Provisioning security in CRNs is challenging since existing techniques, such as entity authentication, are not feasible in the dynamic environment that CRN presents since they require pre-registration. In addition these techniques cannot prevent an authenticated node from acting maliciously. In this article, we advocate the use of reinforcement learning (RL) to achieve optimal or near-optimal solutions for security enhancement through the detection of various malicious nodes and their attacks in CRNs. RL, which is an artificial intelligence technique, has the ability to learn new attacks and to detect previously learned ones. RL has been perceived as a promising approach to enhance the overall security aspect of CRNs. RL, which has been applied to address the dynamic aspect of security schemes in other wireless networks, such as wireless sensor networks and wireless mesh networks can be leveraged to design security schemes in CRNs. We believe that these RL solutions will complement and enhance existing security solutions applied to CRN To the best of our knowledge, this is the first survey article that focuses on the use of RL-based techniques for security enhancement in CRNs.",
author = "Ling, {Mee Hong} and Yau, {Kok-lim Alvin} and Junaid Qadir and Poh, {Geong Sen} and Qiang Ni",
note = "This is the author{\textquoteright}s version of a work that was accepted for publication in Applied Soft Computing. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Applied Soft Computing, 37, 2015 DOI: 10.1016/j.asoc.2015.09.017 ",
year = "2015",
month = dec,
doi = "10.1016/j.asoc.2015.09.017",
language = "English",
volume = "37",
pages = "809--829",
journal = "Applied Soft Computing",
issn = "1568-4946",
publisher = "Elsevier Science B.V.",

}

RIS

TY - JOUR

T1 - Application of reinforcement learning for security enhancement in cognitive radio networks

AU - Ling, Mee Hong

AU - Yau, Kok-lim Alvin

AU - Qadir, Junaid

AU - Poh, Geong Sen

AU - Ni, Qiang

N1 - This is the author’s version of a work that was accepted for publication in Applied Soft Computing. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Applied Soft Computing, 37, 2015 DOI: 10.1016/j.asoc.2015.09.017

PY - 2015/12

Y1 - 2015/12

N2 - Cognitive radio network (CRN) enables unlicensed users (or secondary users, SUs) to sense for and opportunistically operate in underutilized licensed channels, which are owned by the licensed users (or primary users, PUs). Cognitive radio network (CRN) has been regarded as the next-generation wireless network centered on the application of artificial intelligence, which helps the SUs to learn about, as well as to adaptively and dynamically reconfigure its operating parameters, including the sensing and transmission channels, for network performance enhancement. This motivates the use of artificial intelligence to enhance security schemes for CRNs. Provisioning security in CRNs is challenging since existing techniques, such as entity authentication, are not feasible in the dynamic environment that CRN presents since they require pre-registration. In addition these techniques cannot prevent an authenticated node from acting maliciously. In this article, we advocate the use of reinforcement learning (RL) to achieve optimal or near-optimal solutions for security enhancement through the detection of various malicious nodes and their attacks in CRNs. RL, which is an artificial intelligence technique, has the ability to learn new attacks and to detect previously learned ones. RL has been perceived as a promising approach to enhance the overall security aspect of CRNs. RL, which has been applied to address the dynamic aspect of security schemes in other wireless networks, such as wireless sensor networks and wireless mesh networks can be leveraged to design security schemes in CRNs. We believe that these RL solutions will complement and enhance existing security solutions applied to CRN To the best of our knowledge, this is the first survey article that focuses on the use of RL-based techniques for security enhancement in CRNs.

AB - Cognitive radio network (CRN) enables unlicensed users (or secondary users, SUs) to sense for and opportunistically operate in underutilized licensed channels, which are owned by the licensed users (or primary users, PUs). Cognitive radio network (CRN) has been regarded as the next-generation wireless network centered on the application of artificial intelligence, which helps the SUs to learn about, as well as to adaptively and dynamically reconfigure its operating parameters, including the sensing and transmission channels, for network performance enhancement. This motivates the use of artificial intelligence to enhance security schemes for CRNs. Provisioning security in CRNs is challenging since existing techniques, such as entity authentication, are not feasible in the dynamic environment that CRN presents since they require pre-registration. In addition these techniques cannot prevent an authenticated node from acting maliciously. In this article, we advocate the use of reinforcement learning (RL) to achieve optimal or near-optimal solutions for security enhancement through the detection of various malicious nodes and their attacks in CRNs. RL, which is an artificial intelligence technique, has the ability to learn new attacks and to detect previously learned ones. RL has been perceived as a promising approach to enhance the overall security aspect of CRNs. RL, which has been applied to address the dynamic aspect of security schemes in other wireless networks, such as wireless sensor networks and wireless mesh networks can be leveraged to design security schemes in CRNs. We believe that these RL solutions will complement and enhance existing security solutions applied to CRN To the best of our knowledge, this is the first survey article that focuses on the use of RL-based techniques for security enhancement in CRNs.

U2 - 10.1016/j.asoc.2015.09.017

DO - 10.1016/j.asoc.2015.09.017

M3 - Journal article

VL - 37

SP - 809

EP - 829

JO - Applied Soft Computing

JF - Applied Soft Computing

SN - 1568-4946

ER -