DEVELOPING AN ADAPTIVE AND PROACTIVE CYBERSECURITY DEFENSE MECHANISM (APCDM) USING DEEP REINFORCEMENT LEARNING IN WSN
##plugins.themes.bootstrap3.article.main##
Abstract
In the domain of Wireless Sensor Networks (WSNs), where resources are limited and dynamic threats persist, there's a growing requirement for cybersecurity defenses that can adapt and act ahead of time. This research introduces an innovative strategy to tackle this challenge by harnessing the capabilities of Deep Reinforcement Learning (DRL). The study proposes an original method for an Adaptive and Proactive Cyber security Defense Mechanism (APCDM) utilizing Deep Reinforcement Learning within WSNs. The approach entails constructing a simulated cybersecurity environment that accurately imitates real-world threats and network behaviors, allowing for the training and assessment of a DRL agent. This agent engages with the environment, acquiring optimal defensive strategies through advanced DRL algorithms such as Advantage Actor-Critic (A2C) or Trust Region Policy Optimization (TRPO). The agent's goal is steered by a meticulously crafted reward system that encourages actions minimizing vulnerabilities and effectively countering attacks. The resulting mechanism represents a notable advancement in WSN cybersecurity, providing an automated, adaptable, and forward-looking approach to protecting these networks against an ever-changing landscape of threats.
##plugins.themes.bootstrap3.article.details##
References
[2]. Dey, S. Nandi, M. Sarkar, “Security Measures in IOT based 5G Networks”, In Proceedings of the International Conference on Inventive Computation Technologies, pp. 561- 566, 2018.
[3]. Wahid and P. Kumar, “A Survey on Attacks, Challenges and Security Mechanisms in Wireless Sensor Network”, International Journal for Innovative Research in Science and Technology, vol. 1, no. 8, pp.189-196, Jan. 2015.
[4]. Amin, R.; Biswas, G.P. A secure light weight scheme for user authentication and key agreement in multigateway based wireless sensor networks. Ad Hoc Netw. 2016, 36, 58–80.
[5]. Beer, F., & Bühler, U., “Feature selection for flow-based intrusion detection using Rough Set Theory”, International Conference on Networking, Sensing and Control (ICNSC), IEEE, 2017.
[6]. Cam, H., Ozdemir, S., Nair, P., Muthuavinashinappan, D., & Ozgur Sanli, H. ESPDA: Energy-efficient secure pattern based data aggregation for wireless sensor networks. Computer Communication, 29, (2006). 446–455.
[7]. Chen, T.H.; Shih, W.K. A Robust Mutual Authentication Protocol for Wireless Sensor Networks. ETRI J. 2010, 32, 704–712.
[8]. Junqing Zhang, Trung Q. Duong, Roger Woods and Alan Marshall, “Securing Wireless Communications of the Internet of Things from the Physical Layer”, MDPI Publication, 2017.
[9]. K. Chelli, “Security issues in wireless sensor networks: Attacks and countermeasures”, In Proceedings of the World Congress on Engineering, vol. 1, no. 20, pp. 876-3423, 2015.
[10]. Rohini Anand Nimbekar, “Wireless Sensor Networking in the Internet of Things”, International Advanced Research Journal in Science, Engineering and Technology, vol. 4, issue 2, 2017.
[11]. Salehi, S., Razzaque, Mohammad Abdur, Naraei, Parisa & Farrokhtala, Ali, “Security in Wireless Sensor Networks: Issues and challenges”, International Conference on Space Science and Communication, IconSpace. pp.356-360, 2013.
[12]. Turkanovic, M.; Brumen, B.; Hölbl, M. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw. 2014, 20, 96–112.
[13]. V. Pahune, and S. Khode, “Security issues, attacks and challenges in Wireless Sensor Network”, IJESRT, vol. 4, no. 6, pp.56-87, Jun. 2015.
[14]. Wong, K.H.M.; Zheng, Y.; Cao, J.; Wang, S. A Dynamic User Authentication Scheme for Wireless Sensor Networks. In Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichung, Taiwan, 5–7 June 2006; pp. 244–251.
[15]. Yeh, H.-L.; Chen, T.-H.; Liu, P.-C.; Kim, T.-H.; Wei, H.-W. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography. Sensors 2011, 11, 4767–4779.