International Journal of Engineering Technology and Management Sciences

2023, Volume 7 Issue 3

Establishment of Secure Network using Reinforcement Learning

AUTHOR(S)

Nikhil Bhutra, Gaurav Singh, Madhur Mehta, Ohshin Bhat, Dr. Padmavathi M., Dr. T.C.Manjunath

DOI: https://doi.org/10.46647/ijetms.2023.v07i03.118

ABSTRACT
In this paper, the Establishment of Secure Network using Reinforcement Learning concept is presented in a nutshell. The main aim of our project is to develop a system which provides a secure connection between one device to another device, in a public network. The key takeaway from this project is to learn and develop a system which can provide a private network within a public network environment. Our approach to this mini-project is to make an extensive use of Diffie Hellman Technique used across the globe. Diffie Hellman Technique is one of the most trusted network algorithms, used to establish a shared secret-key that can be used for secret communications while exchanging data over a public network. The protocol is considered secure against eavesdroppers. of eavesdroppers and unauthorized access to a private network, the reinforcement learning based (machine learning based) model which can be used to secure the connection and fight against discrepancies in the private keys along with the optimizing the bandwidth and power used for this connection. Reinforcement techniques are used by us for secured communication, and are an essential aspect of modern communication systems. By leveraging machine learning algorithms and dynamic parameter adjustments, these techniques can significantly enhance the security and resilience of communication channels, protecting sensitive information from unauthorized access and interception. A combination of these two technologies can be bridged and put together through an API (Application Program Interface) which is easier to use for the businesses /user to exchange sensitive information with a clean UI. The work done & presented in this paper is the result of the mini-project work that has been done by the sixth sem engineering students of the college and as such there is little novelty in it and the references are being taken from various sources from the internet, the paper is being written by the students to test their writing skills in the starting of their engineering career and also to test the presentation skills during their mini-project presentation.

Page No: 772 - 776

References:

    • Dan Boneh and Matthew K. Franklin (1997), "The Decision Diffie-Hellman Problem" research Paper.
    • W. Diffie and M. E. Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
    • K. Pandey, P. Sharma, and N. Kumar, "Analysis of Diffie-Hellman Key Exchange Algorithm," 2015 IEEE International Conference on Computational Intelligence and Communication Networks (CICN), pp. 307-311, 2015 https://www.semanticscholar.org/paper/Experimental-stud y-of-Diffie-Hellman-key-exchange-Deshpande-Santhanal akshmi/9c7f92be663b03b0144c8601701f4da0cb461089
    • S.B. Patel and S. S. Patel, "Secure and Efficient Key Exchange Algorithm Based on Diffie-Hellman Algorithm," 2018 2nd International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 367-371, 2018.
    • Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.
    • Sutton, R. S., & Barto, A. G. (2018). Reinforcement learning: An introduction (2nd ed.). MIT Press.
    • Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A. A., Veness, J., Bellemare, M. G., ... & Petersen, S. (2015). Human-level control through deep reinforcement learning. Nature, 518 (7540), 529-533.
    • Lillicrap, T. P., Hunt, J. J., Pritzel, A., Heess, N., Erez, T., Tassa, Y., ... & Wierstra, D. (2015). Continuous control with deep reinforcement learning. arXiv preprint arXiv:1509.02971.
    • Arulkumaran, K., Deisenroth, M. P., Brundage, M., & Bharath, A. A. (2017). Deep reinforcement learning: A brief survey. IEEE Signal Processing Magazine, 34(6), 26-38.
    • Sultana, K., Sharma, S., & Buyya, R. (2021). Secure Communication Protocol for IoT Networks using Reinforcement Learning. IEEE Internet of Things Journal, 8(14), 11373-11384.
    • Abiodun, O., Hancke, G. P., & Abu-Mahfouz, A. M. (2021). A Reinforcement Learning-based Intrusion Detection System for Secure Networks. IEEE Transactions on Dependable and Secure Computing.
    • Li, W., & Zhao, D. (2020). A Secure Network Routing Protocol Based on Reinforcement Learning in Mobile Ad Hoc Networks. IEEE Access, 8, 209087-209099.
    • Zhao, J., Lin, Q., & Cai, J. (2020). Reinforcement Learning-based Secure Resource Allocation for Heterogeneous Networks. IEEE Transactions on Wireless Communications, 19(5), 3274-3286.
    • Ren, J., Zhao, Z., Wu, Z., & Chen, Q. (2020). Reinforcement Learning-based Intrusion Detection for Secure Internet of Things. International Journal of Distributed Sensor Networks, 16(6), 1550147720922737.
    • Eslahi-Kelorazi, R., Zabihimayvan, M., Khodaei, M., & Mahmoudi, A. (2020). Secure Routing in Mobile Ad Hoc Networks using Reinforcement Learning-based Approach. Computer Networks, 170, 107135.
    • Zhang, W., Zhang, J., Li, K., & Yu, H. (2020). A Secure Cooperative Spectrum Sensing Scheme Based on Reinforcement Learning in Cognitive Radio Networks. IEEE Access, 8, 197790-197799.
    • Liao, Z., Liu, H., Ren, S., & Tang, Y. (2020). Reinforcement Learning for Secure Relay Selection in Cooperative Cognitive Radio Networks. IEEE Access, 8, 203515-203525.
    • Xiong, J., Wang, J., & Guo, S. (2019). A Secure Routing Algorithm for Heterogeneous Wireless Sensor Networks based on Reinforcement Learning. International Journal of Distributed Sensor Networks, 15(7), 1550147719867137.
    • Kumar, S., & Das, A. (2019). A Reinforcement Learning-based Secure Routing Protocol for Wireless Sensor Networks. International Journal of Distributed Sensor Networks, 15(6), 1550147719854987.
    • Gao, Y., Cheng, L., Wang, Z., & He, Y. (2019). A Secure Cooperative Jamming Scheme Based on Reinforcement Learning in Cognitive Radio Networks. Sensors, 19(15), 3397.
    • Al-Fuqaha, A., Alwesabi, H., Gupta, B. B., & Rayes, A. (2019). Reinforcement Learning-based Secure Communication for IoT Networks. Future Generation Computer Systems, 96, 251-260.
    • Liu, S., Jia, C., Yang, C., & Cheng, H. (2018). Reinforcement Learning for Secure Data Sharing in Vehicular Ad Hoc Networks. IEEE Transactions on Vehicular Technology, 67(10), 9641-9653.
    • Hu, Q., Wang, Y., Han, Y., & Li, Z. (2018). A Secure IoT Communication Framework Based on Reinforcement Learning. In Proceedings of the International Conference on Cloud Computing and Big Data Analysis (pp. 168-173). IEEE.
    • Bhandari, S., Mathur, M., & Kumar, A. (2018). Secure Routing in Wireless Sensor Networks using Reinforcement Learning. In Proceedings of the International Conference on Information Systems Design and Intelligent Applications (pp. 431-441). Springer.
    • Du, W., Tian, L., Wang, Y., & Qu, G. (2018). Secure and Efficient Resource Allocation in MIMO Cognitive Radio Networks with Reinforcement Learning. IEEE Transactions on Cognitive Communications and Networking, 4(3), 455-466.
    • Zhang, T., Zhao, Y., & Tang, S. (2018). Reinforcement Learning-based Secure Data Sharing in Social Internet of Things. Future Generation Computer Systems, 86, 503-514.
    • Li, S., Xu, Y., Ding, B., & Xu, M. (2018). Secure Routing Protocol for Cognitive Radio Ad Hoc Networks Based on Reinforcement Learning. In Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications (pp. 271-282). Springer.
    • Wang, L., Jiang, T., & Wang, X. (2017). A Secure and Efficient Communication Framework for Mobile Ad Hoc Networks Based on Reinforcement Learning. In Proceedings of the International Conference on Smart Computing and Communication (pp. 777-785). Springer.
    • Aksu, H., & Sahingoz, O. K. (2016). Reinforcement Learning-based Secure Localization Algorithm for Wireless Sensor Networks. Ad Hoc Networks, 44, 115-131.
    • Arora, V., & Dutta, P. (2016). A Reinforcement Learning-based Approach for Secure Data Transmission in Wireless Sensor Networks. In Proceedings of the International Conference on Wireless Communications, Signal Processing and Networking (pp. 1-5). IEEE.


How to Cite This Article:
Nikhil Bhutra, Gaurav Singh, Madhur Mehta, Ohshin Bhat, Dr. Padmavathi M., Dr. T.C.Manjunath .Establishment of Secure Network using Reinforcement Learning . ijetms;7(3):772-776. DOI: 10.46647/ijetms.2023.v07i03.118