Artificial Intelligence-based Attack and Countermeasure Agents: Who wins? An Invited Paper

Reinforcement learning (RL) is a branch of artificial intelligence that has been well investigated to show system performance enhancement. Yet, the investigation into the security aspects of RL is at its infancy. This paper offers an investigation of the security aspect of RL. In this paper, RL is applied to cluster size adjustment in clustering for distributed cognitive radio networks whereby the unlicensed or secondary users (SUs) explore and use underutilized channels (or white spaces) owned by the licensed or primary users. Clustering segregates SUs in a network into logical groups; and each cluster consists of a leader (or a clusterhead) and member nodes. The investigation covers the effects of an important RL parameter, specifically the learning rate α, in a dynamic operating environment. Both clusterhead and member node leverage on RL: a) the clusterhead uses RL to countermeasure attacks, and b) the SU uses RL to launch attacks with various attack probabilities. Simulation results have shown that a RL model with learning rate α = 1 for clusterhead provides the highest network scalability when being attacked with various attack probabilities and different learning rates in a dynamic operating environment.

[1]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[2]  Girraj Sharma,et al.  Cluster-based distributed cooperative spectrum sensing over Nakagami fading using diversity reception , 2019, IET Networks.

[3]  Yee Whye Teh,et al.  A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.

[4]  Matthew Hutson Hackers easily fool artificial intelligences. , 2018, Science.

[5]  Danny Kopec,et al.  Artificial Intelligence in the 21st Century , 2012 .

[6]  Roman V Yampolskiy Predicting future AI failures from historic examples , 2019, foresight.

[7]  Samuel Greengard,et al.  Cybersecurity gets smart , 2016, Commun. ACM.

[8]  Roman V. Yampolskiy,et al.  Artificial Intelligence Safety and Cybersecurity: a Timeline of AI Failures , 2016, ArXiv.

[9]  Michael L. Littman,et al.  Reinforcement learning improves behaviour from evaluative feedback , 2015, Nature.

[10]  Si Chen,et al.  NSAC: A Novel Clustering Protocol in Cognitive Radio Sensor Networks for Internet of Things , 2019, IEEE Internet of Things Journal.

[11]  Alex S. Wilner,et al.  Cybersecurity and its discontents: Artificial intelligence, the Internet of Things, and digital misinformation , 2018, International Journal: Canada's Journal of Global Policy Analysis.

[12]  Robert D. Atkinson AI Superpowers: China, Silicon Valley, and the New World Order , 2018 .

[13]  Mee Hong Ling,et al.  Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks , 2019, 2019 International Conference on Information Networking (ICOIN).

[14]  Leïla Azouz Saïdane,et al.  Cluster-based scheduling for cognitive radio sensor networks , 2019, J. Ambient Intell. Humaniz. Comput..

[15]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..