2019
DOI: 10.1109/tccn.2018.2881135
|View full text |Cite
|
Sign up to set email alerts
|

A Reinforcement Learning-Based Trust Model for Cluster Size Adjustment Scheme in Distributed Cognitive Radio Networks

Abstract: Cognitive radio enables secondary users (SUs) to explore and exploit the underutilized licensed channels (or white spaces) owned by the primary users. To improve the network scalability, the SUs are organized into clusters. This article proposes a novel artificial intelligence based trust model approach that uses reinforcement learning (RL) to improve traditional budget-based cluster size adjustment schemes. The RL-based trust model enables the clusterhead to observe and learn about the behaviors of its SU mem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

3
6

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 35 publications
(36 reference statements)
0
11
0
Order By: Relevance
“…Smart malicious SUs can attack the cluster heads to mislead them into inappropriately adjusting the cluster size. To defend against this attack, an RL-based trust model was proposed in [30] to improve traditional budget-based cluster size adjustment schemes. The proposed method enables the cluster head to observe and learn about the behaviors of its SU member nodes and to revoke the membership of malicious SUs in order to alleviate the effects of collaborative intelligent attacks while adjusting the cluster size dynamically according to the availability of white spaces.…”
Section: A ML Based Crnmentioning
confidence: 99%
“…Smart malicious SUs can attack the cluster heads to mislead them into inappropriately adjusting the cluster size. To defend against this attack, an RL-based trust model was proposed in [30] to improve traditional budget-based cluster size adjustment schemes. The proposed method enables the cluster head to observe and learn about the behaviors of its SU member nodes and to revoke the membership of malicious SUs in order to alleviate the effects of collaborative intelligent attacks while adjusting the cluster size dynamically according to the availability of white spaces.…”
Section: A ML Based Crnmentioning
confidence: 99%
“…In [26], the authors proposed a section-based cluster mechanism, which clustered vehicles based on road sections and selected the vehicle closest to the cluster center as the CH, ignoring the driving stability of vehicles. In [27], the authors proposed a dynamic cluster adjustment mechanism to improve the scalability of the vehicular network, where CH discovered malicious cluster member (CM) nodes and adjusted cluster size according to the available spectrum to maximize resource utilization. The authors in [28] proposed a recommendation and switching mechanism in heterogeneous IoV to alleviate the load on the cellular network and improve network performance.…”
Section: Network Clustering and Switching In Iovmentioning
confidence: 99%
“…As such leveraging the power of artificial intelligence [103], [104] may revolutionize all aspect of security which has become increasingly complex. Nevertheless, the use of artificial intelligence can cause security vulnerabilities as attackers can manipulate learned knowledge, and so proper rules should be designed and imposed [105].…”
Section: H Cyber Security Of Smart Portsmentioning
confidence: 99%