Reinforcement Learning-Based Trust and Reputation Model for Spectrum Leasing in Cognitive Radio Networks

Cognitive Radio (CR), which is the next generation wireless communication system, enables unlicensed users or Secondary Users (SUs) to exploit underutilized spectrum (called white spaces) owned by the licensed users or Primary Users (PUs) so that bandwidth availability improves at the SUs, which helps to improve the overall spectrum utilization. Collaboration, which has been adopted in various schemes such distributed channel sensing and channel access, is an intrinsic characteristic of CR to improve network performance. However, the requirement to collaborate has inevitably open doors to various forms of attacks by malicious SUs, and this can be addressed using Trust and Reputation Management (TRM). Generally speaking, TRM detects malicious SUs including honest SUs that turn malicious. To achieve a more efficient detection, we advocate the use of Reinforcement Learning (RL), which is known to be flexible and adaptable to the changes in operating environment in order to achieve optimal network performance. Its ability to learn and re-learn throughout the duration of its existence provides intelligence to the proposed TRM model, and so the focus on RL-based TRM model in this paper. Our preliminary results show that the detection performance of RL-based TRM model has an improvement of 15% over the traditional TRM in a centralized cognitive radio network. The investigation in the paper serves as an important foundation for future work in this research field.

[1]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[2]  Qingqi Pei,et al.  A Trust Management Model in Centralized Cognitive Radio Networks , 2011, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[3]  John M. Chapin,et al.  COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS - The Path to Market Success for Dynamic Spectrum Access Technology , 2007, IEEE Communications Magazine.

[4]  Danijela Cabric,et al.  Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.

[5]  Haiming Wang,et al.  Double Thresholds Based Cooperative Spectrum Sensing Against Untrusted Secondary Users in Cognitive Radio Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[6]  Guanghua Zhang,et al.  Using Trust to Establish Cooperative Spectrum Sensing Framework , 2011 .

[7]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[8]  Qian Zhang,et al.  Cooperative Communication-Aware Spectrum Leasing in Cognitive Radio Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[9]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[10]  Chunyan Miao,et al.  Dynamic witness selection for trustworthy distributed cooperative sensing in cognitive radio networks , 2011, 2011 IEEE 13th International Conference on Communication Technology.

[11]  Andrew G. Barto,et al.  Reinforcement learning , 1998 .

[12]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[13]  Shuai Li,et al.  Believe Yourself: A User-Centric Misbehavior Detection Scheme for Secure Collaborative Spectrum Sensing , 2011, 2011 IEEE International Conference on Communications (ICC).

[14]  Zhu Han,et al.  Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2010, IEEE Transactions on Wireless Communications.

[15]  Sudharman K. Jayaweera,et al.  Dynamic spectrum leasing in cognitive radio networks via primary-secondary user power control games , 2009, IEEE Transactions on Wireless Communications.

[16]  Xiaohong Jiang,et al.  A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio Networks , 2010, 2010 International Conference on Computational Intelligence and Security.

[17]  Anant Sahai,et al.  Cooperative Sensing among Cognitive Radios , 2006, 2006 IEEE International Conference on Communications.

[18]  John M. Chapin,et al.  Time-limited leases in radio systems [Topics in Radio Communications] , 2007, IEEE Communications Magazine.

[19]  Jordi Pérez-Romero,et al.  Dynamic cooperator selection in cognitive radio networks , 2012, Ad Hoc Networks.

[20]  Haitao Zheng,et al.  Balancing Reliability and Utilization in Dynamic Spectrum Access , 2012, IEEE/ACM Transactions on Networking.

[21]  K. J. Ray Liu,et al.  Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.

[22]  Mei Song,et al.  Reinforcement Learning Based Auction Algorithm for Dynamic Spectrum Access in Cognitive Radio Networks , 2010, 2010 IEEE 72nd Vehicular Technology Conference - Fall.

[23]  Ben J. A. Kröse,et al.  Learning from delayed rewards , 1995, Robotics Auton. Syst..

[24]  Xiaola Lin,et al.  A Leasing Oriented MAC Protocol for High Spectrum Usage in Cognitive Radio Networks , 2009, 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[25]  Umberto Spagnolini,et al.  Spectrum Leasing to Cooperating Secondary Ad Hoc Networks , 2008, IEEE Journal on Selected Areas in Communications.

[26]  Zhu Han,et al.  Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks , 2010, EURASIP J. Adv. Signal Process..

[27]  T. Charles Clancy,et al.  Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[28]  Kok-Lim Alvin Yau,et al.  Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues , 2012, J. Netw. Comput. Appl..

[29]  Majid Khabbazian,et al.  Malicious User Detection in a Cognitive Radio Cooperative Sensing System , 2010, IEEE Transactions on Wireless Communications.

[30]  Zhu Han,et al.  Catching Attacker(s) for Collaborative Spectrum Sensing in Cognitive Radio Systems: An Abnormality Detection Approach , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[31]  William A. Arbaugh,et al.  Dynamic spectrum access in cognitive radio networks , 2006 .

[32]  Richard S. Sutton,et al.  Reinforcement Learning , 1992, Handbook of Machine Learning.

[33]  H. T. Mouftah,et al.  A stable clustering formation infrastructure protocol in mobile ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..