A Trust Model for Multi-Hop 5G Networks: A Reinforcement Learning Approach
Trust investigation in 5G the next-generation wireless network, is still naive. The article investigates into a trust model based on reinforcement learning (RL) to select a legitimate (or trusted) forwarding entity (or node). RL can be embedded in an entity (that can be legitimate or malicious) to e...
Saved in:
Published in | International Conference on Advanced Communication Control and Computing Technologies (Online) pp. 1 - 6 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
15.12.2021
|
Subjects | |
Online Access | Get full text |
ISSN | 2644-206X |
DOI | 10.1109/ICOSST53930.2021.9683962 |
Cover
Abstract | Trust investigation in 5G the next-generation wireless network, is still naive. The article investigates into a trust model based on reinforcement learning (RL) to select a legitimate (or trusted) forwarding entity (or node). RL can be embedded in an entity (that can be legitimate or malicious) to enable to learn a higly dynamic and heterogenous environments. The legitimate entity (e.g., a node) uses RL to select the best possible next hop forwarder (a relay) and to successfully transmit the desired packet towards the destination while the malicious entities exist in the network. The malicious entity can also use RL to launch an attack (i.e., intelligent attack) without being detected. Simulation results show that the legitimate entity can learn fast (i.e., converge fast) at a higher learning rate (i.e., \alpha=0.9 ) and perform well in terms of trusted forwarder selection. Nevertheless, the malicious entity can also learn fast and launch successful attacks (i.e., affecting the throughput by dropping the packets) without being detected due to its fugitive nature. |
---|---|
AbstractList | Trust investigation in 5G the next-generation wireless network, is still naive. The article investigates into a trust model based on reinforcement learning (RL) to select a legitimate (or trusted) forwarding entity (or node). RL can be embedded in an entity (that can be legitimate or malicious) to enable to learn a higly dynamic and heterogenous environments. The legitimate entity (e.g., a node) uses RL to select the best possible next hop forwarder (a relay) and to successfully transmit the desired packet towards the destination while the malicious entities exist in the network. The malicious entity can also use RL to launch an attack (i.e., intelligent attack) without being detected. Simulation results show that the legitimate entity can learn fast (i.e., converge fast) at a higher learning rate (i.e., \alpha=0.9 ) and perform well in terms of trusted forwarder selection. Nevertheless, the malicious entity can also learn fast and launch successful attacks (i.e., affecting the throughput by dropping the packets) without being detected due to its fugitive nature. |
Author | Yau, Kok-Lim Alvin Ahmad, Israr |
Author_xml | – sequence: 1 givenname: Israr surname: Ahmad fullname: Ahmad, Israr email: israr.a@imail.sunway.edu.my organization: Sunway University,Dept. of Computing and Information Systems,Bandar Sunway,Malaysia – sequence: 2 givenname: Kok-Lim Alvin surname: Yau fullname: Yau, Kok-Lim Alvin email: koklimy@sunway.edu.my organization: Sunway University,Dept. of Computing and Information Systems,Bandar Sunway,Malaysia |
BookMark | eNotj9FKwzAUQKMoOGe_wJf8QGdub5ImvpWh26Rz4Cr4NtL0VqtbW9IO8e8V3NN5ORw41-yi7VpijIOYAQh7t5pvtttCoUUxS0QCM6sNWp2cscimBrRWElAoPGeTREsZJ0K_XbFoGD6FEAhpagRO2FPGi3AcRr7uKtrzugt8fdyPTbzseq4W_JnG7y58Dfc84y_UtH-CpwO1I8_JhbZp33nW96Fz_uOGXdZuP1B04pS9Pj4U82WcbxareZbHDYAZ44psVQPKsnQpidTV0iIZK8mVBkrhUZMCr7yWvi7TyitC1KXRWhI4ayxO2e1_tyGiXR-agws_u9M9_gI1DVDJ |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICOSST53930.2021.9683962 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781665413053 1665413050 |
EISSN | 2644-206X |
EndPage | 6 |
ExternalDocumentID | 9683962 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL |
ID | FETCH-LOGICAL-i118t-de9df134bba7e07af493e894eab81b0c36e51c5c64cfb7dc5e336b8664e1a9893 |
IEDL.DBID | RIE |
IngestDate | Tue May 06 03:46:05 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i118t-de9df134bba7e07af493e894eab81b0c36e51c5c64cfb7dc5e336b8664e1a9893 |
PageCount | 6 |
ParticipantIDs | ieee_primary_9683962 |
PublicationCentury | 2000 |
PublicationDate | 2021-Dec.-15 |
PublicationDateYYYYMMDD | 2021-12-15 |
PublicationDate_xml | – month: 12 year: 2021 text: 2021-Dec.-15 day: 15 |
PublicationDecade | 2020 |
PublicationTitle | International Conference on Advanced Communication Control and Computing Technologies (Online) |
PublicationTitleAbbrev | ICOSST |
PublicationYear | 2021 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0003177803 |
Score | 1.79109 |
Snippet | Trust investigation in 5G the next-generation wireless network, is still naive. The article investigates into a trust model based on reinforcement learning... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | 5G mobile communication artificial intelligence Reinforcement learning Relays security Simulation Spread spectrum communication Throughput Trust Wireless networks |
Title | A Trust Model for Multi-Hop 5G Networks: A Reinforcement Learning Approach |
URI | https://ieeexplore.ieee.org/document/9683962 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5zJ08qU_xNDh5t1zY_2ngbwzkHm-I22G0k6YuIsg3tLv71vrTdRPHgrZS2hLyQ7-X1-75HyBWXVgLLkyCB3AWI1ywwGjdDmxhrMH_NjPGlgeFI9qd8MBOzBrneamEAoCSfQegvy3_5-dKufamsrSTCud9wd3CZVVqtbT0FcTDNIrYh60Sqfd99GI8ngikW4TkwicP69R99VEoY6e2R4WYAFXvkNVwXJrSfv7wZ_zvCfXL4Ldijj1soOiANWLTIoEMnXlFBfb-zN4rZKS3ltkF_uaLijo4qBvjHDe3QJygdVG1ZLKS16eoz7dSO44dk2ruddPtB3ToheMETQxHkoHIXM26MTiFKteOKQaY4aIN5amSZBBFbYSW3zqS5FcCYNJmUHGKtMIc5Is3FcgHHhBp8DJx2yjnLBcMvIOZnUmue5Bj-6IS0_DzMV5U7xryegtO_b5-RXR8LTwiJxTlpFu9ruEBYL8xlGc8vhqejiQ |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG4IHvSkBoy_7cGjG9v6Y6s3QkREQCMj4Uba7tUYDRAdF_96221gNB68LcvSNG3T77237_seQpeUaw4ki7wIMuNZvCaekvYy1JHSysaviVKuNDAc8d6E9qdsWkNXGy0MABTkM_DdY_EvP1volSuVtQS3cO4u3C1ms4qkVGttKioWCeMkIGu6TiBad52H8ThlRJDAZoJR6FcD_OikUgBJdxcN11Mo-SOv_ipXvv785c743znuoea3ZA8_bsBoH9Vg3kD9Nk6dpgK7jmdv2ManuBDcer3FErNbPCo54B_XuI2foPBQ1UW5EFe2q8-4XXmON9Gke5N2el7VPMF7sTlD7mUgMhMSqpSMIYiloYJAIihIZSPVQBMOLNRMc6qNijPNgBCuEs4phFLYKOYA1eeLORwirOxnYKQRxmjKiB3Bon7CpaRRZg9AcIQabh1my9IfY1YtwfHfry_Qdi8dDmaDu9H9Cdpx--LoISE7RfX8fQVnFuRzdV7s7RdSx6bc |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=International+Conference+on+Advanced+Communication+Control+and+Computing+Technologies+%28Online%29&rft.atitle=A+Trust+Model+for+Multi-Hop+5G+Networks%3A+A+Reinforcement+Learning+Approach&rft.au=Ahmad%2C+Israr&rft.au=Yau%2C+Kok-Lim+Alvin&rft.date=2021-12-15&rft.pub=IEEE&rft.eissn=2644-206X&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FICOSST53930.2021.9683962&rft.externalDocID=9683962 |