Application of reinforcement learning for security enhancement in cognitive radio networks

Ling, Mee Hong and Yau, Kok-lim Alvin and Qadir, Junaid and Poh, Geong Sen and Ni, Qiang (2015) Application of reinforcement learning for security enhancement in cognitive radio networks. Applied Soft Computing, 37. pp. 809-829. ISSN 1568-4946

[thumbnail of Mehong-RL-c2-final]
PDF (Mehong-RL-c2-final)
Mehong_RL_c2_final.pdf - Accepted Version
Available under License Creative Commons Attribution-NonCommercial-NoDerivs.

Download (1MB)


Cognitive radio network (CRN) enables unlicensed users (or secondary users, SUs) to sense for and opportunistically operate in underutilized licensed channels, which are owned by the licensed users (or primary users, PUs). Cognitive radio network (CRN) has been regarded as the next-generation wireless network centered on the application of artificial intelligence, which helps the SUs to learn about, as well as to adaptively and dynamically reconfigure its operating parameters, including the sensing and transmission channels, for network performance enhancement. This motivates the use of artificial intelligence to enhance security schemes for CRNs. Provisioning security in CRNs is challenging since existing techniques, such as entity authentication, are not feasible in the dynamic environment that CRN presents since they require pre-registration. In addition these techniques cannot prevent an authenticated node from acting maliciously. In this article, we advocate the use of reinforcement learning (RL) to achieve optimal or near-optimal solutions for security enhancement through the detection of various malicious nodes and their attacks in CRNs. RL, which is an artificial intelligence technique, has the ability to learn new attacks and to detect previously learned ones. RL has been perceived as a promising approach to enhance the overall security aspect of CRNs. RL, which has been applied to address the dynamic aspect of security schemes in other wireless networks, such as wireless sensor networks and wireless mesh networks can be leveraged to design security schemes in CRNs. We believe that these RL solutions will complement and enhance existing security solutions applied to CRN To the best of our knowledge, this is the first survey article that focuses on the use of RL-based techniques for security enhancement in CRNs.

Item Type:
Journal Article
Journal or Publication Title:
Applied Soft Computing
Additional Information:
This is the author’s version of a work that was accepted for publication in Applied Soft Computing. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Applied Soft Computing, 37, 2015 DOI: 10.1016/j.asoc.2015.09.017
Uncontrolled Keywords:
ID Code:
Deposited By:
Deposited On:
27 Jan 2016 13:12
Last Modified:
13 Oct 2023 00:24