A Trust Model for Multi-Hop 5G Networks: A Reinforcement Learning Approach

Trust investigation in 5G the next-generation wireless network, is still naive. The article investigates into a trust model based on reinforcement learning (RL) to select a legitimate (or trusted) forwarding entity (or node). RL can be embedded in an entity (that can be legitimate or malicious) to e...

Full description

Saved in:
Bibliographic Details
Published inInternational Conference on Advanced Communication Control and Computing Technologies (Online) pp. 1 - 6
Main Authors Ahmad, Israr, Yau, Kok-Lim Alvin
Format Conference Proceeding
LanguageEnglish
Published IEEE 15.12.2021
Subjects
Online AccessGet full text
ISSN2644-206X
DOI10.1109/ICOSST53930.2021.9683962

Cover

Abstract Trust investigation in 5G the next-generation wireless network, is still naive. The article investigates into a trust model based on reinforcement learning (RL) to select a legitimate (or trusted) forwarding entity (or node). RL can be embedded in an entity (that can be legitimate or malicious) to enable to learn a higly dynamic and heterogenous environments. The legitimate entity (e.g., a node) uses RL to select the best possible next hop forwarder (a relay) and to successfully transmit the desired packet towards the destination while the malicious entities exist in the network. The malicious entity can also use RL to launch an attack (i.e., intelligent attack) without being detected. Simulation results show that the legitimate entity can learn fast (i.e., converge fast) at a higher learning rate (i.e., \alpha=0.9 ) and perform well in terms of trusted forwarder selection. Nevertheless, the malicious entity can also learn fast and launch successful attacks (i.e., affecting the throughput by dropping the packets) without being detected due to its fugitive nature.
AbstractList Trust investigation in 5G the next-generation wireless network, is still naive. The article investigates into a trust model based on reinforcement learning (RL) to select a legitimate (or trusted) forwarding entity (or node). RL can be embedded in an entity (that can be legitimate or malicious) to enable to learn a higly dynamic and heterogenous environments. The legitimate entity (e.g., a node) uses RL to select the best possible next hop forwarder (a relay) and to successfully transmit the desired packet towards the destination while the malicious entities exist in the network. The malicious entity can also use RL to launch an attack (i.e., intelligent attack) without being detected. Simulation results show that the legitimate entity can learn fast (i.e., converge fast) at a higher learning rate (i.e., \alpha=0.9 ) and perform well in terms of trusted forwarder selection. Nevertheless, the malicious entity can also learn fast and launch successful attacks (i.e., affecting the throughput by dropping the packets) without being detected due to its fugitive nature.
Author Yau, Kok-Lim Alvin
Ahmad, Israr
Author_xml – sequence: 1
  givenname: Israr
  surname: Ahmad
  fullname: Ahmad, Israr
  email: israr.a@imail.sunway.edu.my
  organization: Sunway University,Dept. of Computing and Information Systems,Bandar Sunway,Malaysia
– sequence: 2
  givenname: Kok-Lim Alvin
  surname: Yau
  fullname: Yau, Kok-Lim Alvin
  email: koklimy@sunway.edu.my
  organization: Sunway University,Dept. of Computing and Information Systems,Bandar Sunway,Malaysia
BookMark eNotj9FKwzAUQKMoOGe_wJf8QGdub5ImvpWh26Rz4Cr4NtL0VqtbW9IO8e8V3NN5ORw41-yi7VpijIOYAQh7t5pvtttCoUUxS0QCM6sNWp2cscimBrRWElAoPGeTREsZJ0K_XbFoGD6FEAhpagRO2FPGi3AcRr7uKtrzugt8fdyPTbzseq4W_JnG7y58Dfc84y_UtH-CpwO1I8_JhbZp33nW96Fz_uOGXdZuP1B04pS9Pj4U82WcbxareZbHDYAZ44psVQPKsnQpidTV0iIZK8mVBkrhUZMCr7yWvi7TyitC1KXRWhI4ayxO2e1_tyGiXR-agws_u9M9_gI1DVDJ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICOSST53930.2021.9683962
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781665413053
1665413050
EISSN 2644-206X
EndPage 6
ExternalDocumentID 9683962
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
OCL
RIE
RIL
ID FETCH-LOGICAL-i118t-de9df134bba7e07af493e894eab81b0c36e51c5c64cfb7dc5e336b8664e1a9893
IEDL.DBID RIE
IngestDate Tue May 06 03:46:05 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i118t-de9df134bba7e07af493e894eab81b0c36e51c5c64cfb7dc5e336b8664e1a9893
PageCount 6
ParticipantIDs ieee_primary_9683962
PublicationCentury 2000
PublicationDate 2021-Dec.-15
PublicationDateYYYYMMDD 2021-12-15
PublicationDate_xml – month: 12
  year: 2021
  text: 2021-Dec.-15
  day: 15
PublicationDecade 2020
PublicationTitle International Conference on Advanced Communication Control and Computing Technologies (Online)
PublicationTitleAbbrev ICOSST
PublicationYear 2021
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003177803
Score 1.79109
Snippet Trust investigation in 5G the next-generation wireless network, is still naive. The article investigates into a trust model based on reinforcement learning...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms 5G mobile communication
artificial intelligence
Reinforcement learning
Relays
security
Simulation
Spread spectrum communication
Throughput
Trust
Wireless networks
Title A Trust Model for Multi-Hop 5G Networks: A Reinforcement Learning Approach
URI https://ieeexplore.ieee.org/document/9683962
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5zJ08qU_xNDh5t1zY_2ngbwzkHm-I22G0k6YuIsg3tLv71vrTdRPHgrZS2hLyQ7-X1-75HyBWXVgLLkyCB3AWI1ywwGjdDmxhrMH_NjPGlgeFI9qd8MBOzBrneamEAoCSfQegvy3_5-dKufamsrSTCud9wd3CZVVqtbT0FcTDNIrYh60Sqfd99GI8ngikW4TkwicP69R99VEoY6e2R4WYAFXvkNVwXJrSfv7wZ_zvCfXL4Ldijj1soOiANWLTIoEMnXlFBfb-zN4rZKS3ltkF_uaLijo4qBvjHDe3QJygdVG1ZLKS16eoz7dSO44dk2ruddPtB3ToheMETQxHkoHIXM26MTiFKteOKQaY4aIN5amSZBBFbYSW3zqS5FcCYNJmUHGKtMIc5Is3FcgHHhBp8DJx2yjnLBcMvIOZnUmue5Bj-6IS0_DzMV5U7xryegtO_b5-RXR8LTwiJxTlpFu9ruEBYL8xlGc8vhqejiQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG4IHvSkBoy_7cGjG9v6Y6s3QkREQCMj4Uba7tUYDRAdF_96221gNB68LcvSNG3T77237_seQpeUaw4ki7wIMuNZvCaekvYy1JHSysaviVKuNDAc8d6E9qdsWkNXGy0MABTkM_DdY_EvP1volSuVtQS3cO4u3C1ms4qkVGttKioWCeMkIGu6TiBad52H8ThlRJDAZoJR6FcD_OikUgBJdxcN11Mo-SOv_ipXvv785c743znuoea3ZA8_bsBoH9Vg3kD9Nk6dpgK7jmdv2ManuBDcer3FErNbPCo54B_XuI2foPBQ1UW5EFe2q8-4XXmON9Gke5N2el7VPMF7sTlD7mUgMhMSqpSMIYiloYJAIihIZSPVQBMOLNRMc6qNijPNgBCuEs4phFLYKOYA1eeLORwirOxnYKQRxmjKiB3Bon7CpaRRZg9AcIQabh1my9IfY1YtwfHfry_Qdi8dDmaDu9H9Cdpx--LoISE7RfX8fQVnFuRzdV7s7RdSx6bc
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Advanced+Communication+Control+and+Computing+Technologies+%28Online%29&rft.atitle=A+Trust+Model+for+Multi-Hop+5G+Networks%3A+A+Reinforcement+Learning+Approach&rft.au=Ahmad%2C+Israr&rft.au=Yau%2C+Kok-Lim+Alvin&rft.date=2021-12-15&rft.pub=IEEE&rft.eissn=2644-206X&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FICOSST53930.2021.9683962&rft.externalDocID=9683962