Secure Routing Protocol in Wireless Ad Hoc Networks via Deep Learning

Open wireless channels make a wireless ad hoc network vulnerable to various security attacks, so it is crucial to design a routing protocol that can defend against the attacks of malicious nodes. In this paper, we first measure the trust value calculated by the node behavior in a period to judge whether the node is trusted, and then combine other QoS requirements as the routing metrics to design a secure routing approach. Moreover, we propose a deep learning-based model to learn the routing environment repeatedly from the data sets of packet flow and corresponding optimal paths. Then, when a new packet flow is input, the model can output a link set that satisfies the node’s QoS and trust requirements directly, and therefore the optimal path of the packet flow can be obtained. The extensive simulation results show that compared with the traditional optimization-based method, our proposed deep learning-based approach cannot only guarantee more than 90% accuracy, but also significantly improves the computation time.

[1]  Miao Pan,et al.  Maximizing the lifetime of delay-sensitive sensor networks via joint routing and sleep scheduling , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[2]  Edward J. Coyle,et al.  Delay-efficient routing across high-throughput wireless network clusters , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[3]  Yu Cheng,et al.  Deep Learning Meets Wireless Network Optimization: Identify Critical Links , 2020, IEEE Transactions on Network Science and Engineering.

[4]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[5]  Khalid Haseeb,et al.  TERP: A Trust and Energy Aware Routing Protocol for Wireless Sensor Network , 2015, IEEE Sensors Journal.

[6]  Edwin Hsing-Mean Sha,et al.  Trust prediction and trust-based source routing in mobile ad hoc networks , 2013, Ad Hoc Networks.

[7]  Willy Susilo,et al.  A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks , 2018, IEEE Transactions on Vehicular Technology.

[8]  Ananthram Swami,et al.  Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks , 2017, IEEE Transactions on Services Computing.

[9]  Zhetao Li,et al.  A Novel Light-Weight Subjective Trust Inference Framework in MANETs , 2020, IEEE Transactions on Sustainable Computing.

[10]  Chiara Petrioli,et al.  Pro-Energy: A novel energy prediction model for solar and wind energy-harvesting wireless sensor networks , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).

[11]  Hsing-Chung Chen,et al.  TCABRP: A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks , 2017, IEEE Systems Journal.

[12]  Derek C. Rose,et al.  Deep Machine Learning - A New Frontier in Artificial Intelligence Research [Research Frontier] , 2010, IEEE Computational Intelligence Magazine.

[13]  Seyed M. Buhari,et al.  Trusted Secure Adhoc On-demand Multipath Distance Vector Routing in MANET , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[14]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[15]  Keqiu Li,et al.  How Can Heterogeneous Internet of Things Build Our Future: A Survey , 2018, IEEE Communications Surveys & Tutorials.