Skip to main content
Log in

An advanced actor critic deep reinforcement learning technique for gamification of WiFi environment

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The Open System Interconnection Model’s physical layer implementation contains several networks including the wireless networks working system over radio waves. Since any device with wireless capabilities enabled can access the wireless network, hence most of them are protected by password and giving rise to the development of several security protocols over the time by the Wireless Fidelity (WiFi) Alliance. Currently, the most prevalent Wireless Protected Access (WPA/WPA2) systems are widely used across the globe despite the WPA3 model. The WPA/WPA2 uses a 256-bit pre-shared key also called as passphrase for authenticating users, hence like any other passphrase the shorter ones are vulnerable to attacks that can decrypt the hash formed out of handshake information. Thus, the security analyst should monitor the network from sniffing attacks during a handshake process and if the attack detects the user data then it tends to create several vulnerabilities. For this reason, in this paper, an Artificial Intelligence system is proposed over an offensive framework in gamification of WiFi environment. This work describes gamification of the WiFi environment for capturing those packets using Advantage-Actor-Critic based deep Reinforcement Learning method. Also, the game creature is deployed on a Raspberry pi model that learns from the network environment and makes it as a miniature pocket monster to facilitate the existing manual wireless packet capture process. These smart creatures can also communicate with one another by broadcasting their presence to each other and dividing Wi-Fi channels amongst themselves thereby setting up an internet of things.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Sarkar, D., & Srivastava, K. V. (2017). Compact four-element SRR-loaded dual-band MIMO antenna for WLAN/WiMAX/WiFi/4G-LTE and 5G applications. Electronics Letters, 53(25), 1623–1624.

    Article  Google Scholar 

  2. Anitha, V. R., Cho, M., & Shim, J. (2017). Design of two by three element fractal tree antenna array for WLAN and WiFi applications. Journal of Communications Technology and Electronics, 62(1), 61–65.

    Article  Google Scholar 

  3. Abanto-Leon, L. F., et al. (2020). Stay connected, leave no trace: Enhancing security and privacy in WiFi via obfuscating radiometric fingerprints. In Proceedings of the ACM on Measurement and Analysis of Computing Systems 4.3, 1–31.

  4. Ayong, Ye., et al. (2020). Detection of spoofing attacks in WLAN-based positioning systems using WiFi hotspot tags. IEEE Access, 8, 39768–39780.

    Article  Google Scholar 

  5. Buenrostro, E., et al. (2018). Security of IoT devices. Journal of Cyber Security Technology 2.1, 1–13.

  6. Alliance, Wi-Fi. Wi-Fi Alliance introduces Wi-Fi certified WPA3 security (2019).

  7. Chyrun, L., et al. (2019). Information system for connection to the access point with encryption WPA2 enterprise. In International Scientific Conference “Intellectual Systems of Decision Making and Problem of Computational Intelligence”. Springer, Cham.

  8. Wang, K., et al. (2017). Strategic anti eavesdropping game for physical layer security in wireless cooperative networks. IEEE Transactions on Vehicular Technology 66(10), 9448–9457.

  9. Cremers, C., Kiesl, B., Medinger, N. (2020). A formal analysis of {IEEE} 802.11’s WPA2: Countering the kracks caused by cracking the counters. In 29th {USENIX} Security Symposium ({USENIX} Security 20).

  10. Pandikumar, T., & Yesuf, M. A. (2017). Wi-Fi security and test bed implementation for WEP and WPA cracking. International Journal of Engineering Science 13571.

  11. Kumar, V., Jha, R. K., Jain, S. (2020). ANGUISH: Security attack in narrowband‐Internet of Things (NB‐IoT) using game theory and hardware analysis. Transactions on Emerging Telecommunications Technologies, e3987.

  12. Katsadouros, E., et al. (2017). Teaching network security through a scavenger hunt game. In 2017 IEEE global engineering education conference (EDUCON). IEEE.

  13. Mahini, H., & Mousavirad, S. M. (2020). WiFi intrusion detection and prevention systems analyzing: A game theoretical perspective. International Journal of Wireless Information Networks, 27(1), 77–88.

    Article  Google Scholar 

  14. Ahmad, A., et al. (2019). Adaptive security for self-protection of mobile computing devices. Mobile Networks and Application, 1–20.

  15. Balaji, S., et al. (2019). Design of a security-aware routine scheme in mobile adhoc network using repeated game model. Computer Standards & Interfaces, 66, 103358.

    Article  Google Scholar 

  16. Karakovskiy, S., & Togelius, J. (2012). Mario ai benchmark & competitions. IEEE Transactions on AI in Games, 4(1), 55–67.

    Google Scholar 

  17. Togelius, J., Karakovskiy, S., Koutnık, J., & Schmidhuber, J. (2009). Super mario evolution. In 2009 IEEE symposium on computational intelligence and games (pp. 156–161). IEEE.

  18. Neamah, M. R., Thuwaib, H. A., & Frahan, B. I. (2021). An analyzing process on wireless protection criteria focussing on (WPA) within computer network security. Periodicals of Engineering and Natural Sciences (PEN), 9(1), 242–252.

    Article  Google Scholar 

  19. Wang, C. X., et al. (2020). Artificial intelligence enable wireless networking for 5G and beyond: Recent advances and future challenges. IEEE Wireless Communications, 27(1), 16–23.

    Article  Google Scholar 

  20. Mohanta, B. K., et al. (2020). Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology. Internet of Things, 11, 100227.

    Article  Google Scholar 

  21. Zhao, R., et al. (2020). Deep reinforcement learning based mobile edge computing for intelligent Internet of Things. Physical Communication, 43, 101184.

    Article  Google Scholar 

  22. Qiu, X., Dai, J., & Hayes, M. (2020). A learning approach for physical layer authentication using adaptive neural network. IEEE Access, 8, 26139–26149.

    Article  Google Scholar 

  23. Parras, J., & Zazo, S. (2019). Learning attack mechanisms in wireless sensor networks using Markov decision processes. Expert Systems with Applications, 122, 376–387.

    Article  Google Scholar 

  24. Huang, L., & Zhu, Q. (2020). A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems. Computers & Security, 89, 101660.

    Article  Google Scholar 

  25. Wang, X., & Zhang, X. (2019). Wireless network attack defense algorithm using deep neural network in internet of things environment. International Journal of Wireless Information Networks, 26(3), 143–151.

    Article  Google Scholar 

  26. Jabbari, A., & Mohasefi, J. B. (2021). Improvement of a user authentication scheme for wireless sensor networks based on internet of things security. Wireless Personal Communications, 116(3), 2565–2591.

    Article  Google Scholar 

  27. Kremser, S. (2017). esp8266 deauther(2018). https://github.com/spacehuhn/esp8266 deauther. Li, Yuxi. "Deep reinforcement learning: An overview." arXiv preprint arXiv:1701.07274.

  28. Xu, M., Chen, Y., & Wang, W. (2020). A two-stage game framework to secure transmission in two-tier UAV networks. IEEE Transactions on Vehicular Technology, 69(11), 13728–13740.

    Article  Google Scholar 

  29. Halabi, T., & Bellaiche, M. (2018). Towards security-based formation of cloud federations: A game theoretical approach. IEEE Transactions on Cloud Computing, 8(3), 928–942.

    Google Scholar 

  30. Waqas, M., et al. (2018). Social-aware secret key generation for secure device-to-device communication via trusted and non-trusted relays. IEEE Transactions on Wireless Communications, 17(6), 3918–4393.

    Article  Google Scholar 

  31. Kohlios, C. P., & Hayajneh, T. (2018). A comprehensive attack flow model and security analysis for Wi-Fi and WPA3. Electronics, 7(11), 284.

    Article  Google Scholar 

  32. Martin, J., N. S. A. I. A. M. CISSP-ISSAP, and CEH IEM. (2009). The Art of casual WiFi hacking." CISSP-ISSAP.

  33. Berghel, H., & Uecker, J. (2005). WiFi attack vectors. Communications of the ACM, 48(8), 21–28.

    Article  Google Scholar 

  34. Thien, H. T., Vu, V.-H., & Koo, I. (2021). A transfer games actor-critic learning framework for anti-jamming in multi-channel cognitive radio networks. IEEE Access, 9, 47887–47900.

    Article  Google Scholar 

  35. Li, Y. (2017). Deep reinforcement learning: an overview. arXiv preprint arXiv:1701.07274.

  36. Grondman, I., et al. (2012). A survey of actor-critic reinforcement learning: Standard and natural policy gradients. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 42(6), 1291–1307.

  37. Ravichandiran, S. (2018). Hands-on reinforcement learning with python: master reinforcement and deep reinforcement learning using OpenAI Gym and TensorFlow. Packt Publishing Ltd.

  38. Akhtar, E., & Farrukh, S. M. (2017). Practical reinforcement learning: Develop self-evolving, intelligent agents with OpenAI Gym. Packt Publishing.

    Google Scholar 

  39. Vanhoef, M., Ronen, E. (2020). Dragonblood: Analyzing the dragonfly handshake of WPA3 and EAP-pwd. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE.

  40. Saout, C. (2014). dm-crypt: a device-mapper crypto target, 2007. http://www.saout.de/misc/dm-crypt.

Download references

Funding

This work has not received any funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vandana Shakya.

Ethics declarations

Competing interests

None.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shakya, V., Choudhary, J. & Singh, D.P. An advanced actor critic deep reinforcement learning technique for gamification of WiFi environment. Wireless Netw (2023). https://doi.org/10.1007/s11276-023-03582-4

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11276-023-03582-4

Keywords

Navigation