Author
Listed:
- Nyashadzashe Tamuka
(Department of Information Technology, Tshwane University of Technology, Soshanguve, Pretoria 0152, South Africa)
- Topside Ehleketani Mathonsi
(Department of Information Technology, Tshwane University of Technology, Soshanguve, Pretoria 0152, South Africa)
- Thomas Otieno Olwal
(Department of Information Technology, Tshwane University of Technology, Soshanguve, Pretoria 0152, South Africa)
- Solly Maswikaneng
(Department of Information Technology, Tshwane University of Technology, Soshanguve, Pretoria 0152, South Africa)
- Tonderai Muchenje
(Department of Information Technology, Tshwane University of Technology, Soshanguve, Pretoria 0152, South Africa)
- Tshimangadzo Mavin Tshilongamulenzhe
(Department of Information Technology, Tshwane University of Technology, Soshanguve, Pretoria 0152, South Africa)
Abstract
Fog computing extends cloud services to the network edge, enabling low-latency processing for Internet of Things (IoT) applications. However, this distributed approach is vulnerable to a wide range of attacks, necessitating advanced intrusion detection systems (IDSs) that operate under resource constraints. This study proposes integrating self-awareness (online learning and concept drift adaptation) into a lightweight RL (reinforcement learning)-based IDS for fog networks and quantitatively comparing it with non-RL static thresholds and bandit-based approaches in real time. Novel self-aware reinforcement learning (RL) models, the Hierarchical Adaptive Thompson Sampling–Reinforcement Learning (HATS-RL) model, and the Federated Hierarchical Adaptive Thompson Sampling–Reinforcement Learning (F-HATS-RL), were proposed for real-time intrusion detection in a fog network. These self-aware RL policies integrated online uncertainty estimation and concept-drift detection to adapt to evolving attacks. The RL models were benchmarked against the static threshold (ST) model and a widely adopted linear bandit (Linear Upper Confidence Bound/LinUCB). A realistic fog network simulator with heterogeneous nodes and streaming traffic, including multi-type attack bursts and gradual concept drift, was established. The models’ detection performance was compared using metrics including latency, energy consumption, detection accuracy, and the area under the precision–recall curve (AUPR) and the area under the receiver operating characteristic curve (AUROC). Notably, the federated self-aware agent (F-HATS-RL) achieved the best AUROC (0.933) and AUPR (0.857), with a latency of 0.27 ms and the lowest energy consumption of 0.0137 mJ, indicating its ability to detect intrusions in fog networks with minimal energy. The findings suggest that self-aware RL agents can detect traffic–dynamic attack methods and adapt accordingly, resulting in more stable long-term performance. By contrast, a static model’s accuracy degrades under drift.
Suggested Citation
Nyashadzashe Tamuka & Topside Ehleketani Mathonsi & Thomas Otieno Olwal & Solly Maswikaneng & Tonderai Muchenje & Tshimangadzo Mavin Tshilongamulenzhe, 2026.
"A Comparative Analysis of Self-Aware Reinforcement Learning Models for Real-Time Intrusion Detection in Fog Networks,"
Future Internet, MDPI, vol. 18(2), pages 1-25, February.
Handle:
RePEc:gam:jftint:v:18:y:2026:i:2:p:100-:d:1864765
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:18:y:2026:i:2:p:100-:d:1864765. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.