{"title":"基于mab -学习的水声安全网络分层防御","authors":"Yi Zhou, Qunfei Zhang, Zhenhua Yan, Chengbing He","doi":"10.1109/ICCCWorkshops52231.2021.9538873","DOIUrl":null,"url":null,"abstract":"The underwater acoustic network (UAN) without defensive support is unreliable in an increasingly competitive marine environment. In this paper, a hierarchical defense algorithm that applies multi-armed bandit (MAB) learning is presented to combat the intelligent mobile attackers and protect the underwater relay transmissions. Specifically, the identities of the significant nodes of a network are changed periodically to hide the critical routing paths. The learning-based communication system can achieve stable links through the optimal spoofing scheme that is to mislead the attackers sensitive to the environmental feedback, and then alleviate the potential threat from invaders. Simulation results verify that the proposed defense strategy can fast reduce the outage probability of the protected objects and prolong the lifetime of underwater networks.","PeriodicalId":335240,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","volume":"13 9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"MAB-Learning-Based Hierarchical Defense for Secure Underwater Acoustic Networks\",\"authors\":\"Yi Zhou, Qunfei Zhang, Zhenhua Yan, Chengbing He\",\"doi\":\"10.1109/ICCCWorkshops52231.2021.9538873\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The underwater acoustic network (UAN) without defensive support is unreliable in an increasingly competitive marine environment. In this paper, a hierarchical defense algorithm that applies multi-armed bandit (MAB) learning is presented to combat the intelligent mobile attackers and protect the underwater relay transmissions. Specifically, the identities of the significant nodes of a network are changed periodically to hide the critical routing paths. The learning-based communication system can achieve stable links through the optimal spoofing scheme that is to mislead the attackers sensitive to the environmental feedback, and then alleviate the potential threat from invaders. Simulation results verify that the proposed defense strategy can fast reduce the outage probability of the protected objects and prolong the lifetime of underwater networks.\",\"PeriodicalId\":335240,\"journal\":{\"name\":\"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)\",\"volume\":\"13 9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCWorkshops52231.2021.9538873\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCWorkshops52231.2021.9538873","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
MAB-Learning-Based Hierarchical Defense for Secure Underwater Acoustic Networks
The underwater acoustic network (UAN) without defensive support is unreliable in an increasingly competitive marine environment. In this paper, a hierarchical defense algorithm that applies multi-armed bandit (MAB) learning is presented to combat the intelligent mobile attackers and protect the underwater relay transmissions. Specifically, the identities of the significant nodes of a network are changed periodically to hide the critical routing paths. The learning-based communication system can achieve stable links through the optimal spoofing scheme that is to mislead the attackers sensitive to the environmental feedback, and then alleviate the potential threat from invaders. Simulation results verify that the proposed defense strategy can fast reduce the outage probability of the protected objects and prolong the lifetime of underwater networks.