Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Reinforcement based Cognitive Algorithms to Detect Malicious Node in Wireless Networks

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 109 - Number 16
Year of Publication: 2015
Authors:
G Sunilkumar
Thriveni J
K R Venugopal
Manjunatha C
L M Patnaik
10.5120/19273-0990

G Sunilkumar, Thriveni J, K R Venugopal, Manjunatha C and L M Patnaik. Article: Reinforcement based Cognitive Algorithms to Detect Malicious Node in Wireless Networks. International Journal of Computer Applications 109(16):29-34, January 2015. Full text available. BibTeX

@article{key:article,
	author = {G Sunilkumar and Thriveni J and K R Venugopal and Manjunatha C and L M Patnaik},
	title = {Article: Reinforcement based Cognitive Algorithms to Detect Malicious Node in Wireless Networks},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {109},
	number = {16},
	pages = {29-34},
	month = {January},
	note = {Full text available}
}

Abstract

The growth of wireless communication technologies and its applications leads to many security issues. Malicious node detection is one among the major security issues. Adoption of cognition can detect and Prevent malicious activities in the wireless networks. To achieve cognition into wireless networks, we are using reinforcement learning techniques. By using the existing reinforcement techniques, we have proposed GreedyQ cognitive (GQC) and SoftSARSA cognitive (SSC) algorithms for malicious node detection and the performances among these algorithms are evaluated and the result shows SSC algorithm is best algorithm. The proposed algorithms perform better in malicious node detection as compared to the existing algorithms.

References

  • Milos Rovcanin, Eli De Poorter, Ingrid Moerman and Piet Demeester, "An LSPI based reinforcement learning approach to enable network cooperation in cognitive wireless sensor networks", Proceedings of International conference on Advanced Information Networking and Applications Workshops, pp. 82-89, March 2013.
  • J Mitola III, "Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio", PhD thesis, Royal Institute of Technology, Sweden.
  • R Saracco, "Forecasting the future of information technology: How to make research investment more cost-effective", IEEE Communications Magazine, vol. 41, pp. 38–45, December 2003.
  • John Boyd, " A discourse on winning and losing: Patterns of conflict", Conceptual Spiral and the meaning of life, 1986.
  • K Cheng Howa, M Maa, and Y Qin, "An Altruistic Differentiated Service Protocol in Dynamic Cognitive Radio Networks Against Sel?sh Behaviors", IEEE Transactions on Computer Networks, vol. 56, no. 7, pp. 2068–79, 2012.
  • Minho Jo, Longzhe Han, Dohoon Kim, Hoh Peter, "Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks", IEEE Transactions on Network, June 2013.
  • Yongkun Li, John C S Lui, "On Detecting Malicious Behaviors in Interactive Networks: Algorithms and Analysis", IEEE, 2012.
  • Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong Dong, Zhenfu Cao, "A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks", IEEE Transactions on Parallel and Distributed Systems, 2013.
  • Praveen Kaligineedi, Majid Khabbazian, Vijay K Bhargava, "Malicious User Detection in a Cognitive Radio Cooperative Sensing System", IEEE Transactions on Wireless Communications, vol. 9, no. 8, August 2010.
  • Nicola Baldo, Michele Zorzi, "Cognitive Network Access using Fuzzy Decision Making", IEEE Transactions on Wireless Communications, Vol. 8, no. 7, July 2009.
  • K Sundaresan and K Papagiannaki, "The need for cross-layer information in access point selection", Proceedings of International Conference on Internet Measurement, Brazil, Oct. 2006.
  • A Nicholson, Y Chawathe, M Chen, B Noble and D Wetherall, "Improved access point selection", Proceedings of International Conference on Mobile Systems, Applications and Services, Sweden, June 2006.
  • D Deng and H Yen, "Quality-of-service provisioning system for multimedia transmission in IEEE 802. 11 wireless LANs", IEEE Journals on Communication, vol. 23, no. 6, pp. 1240–1252, 2005.
  • M Matsumoto and T Itoh, "QoS-guarantee method for public wireless LAN access environments", Proceedings of International Conference on Wireless Networks, Communications and Mobile Computing, USA, June 2005.
  • Ryan W Thomas, Luiz A DaSilva, Madhav V Marathe, Kerry N Wood, "Critical Design Decisions for Cognitive Networks", IEEE, 2007.
  • G Sunilkumar, Thriveni J, K R Venugopal, L M Patnaik, "Cognitive Approach Based User Node Activity Monitoring for Intrusion Detection in Wireless Networks", International Journal of Computer Science Issues, vol. 9, Issue 2, no. 3, March 2012.