首页> 外文期刊>Computer Communications >Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL
【24h】

Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL

机译:移动雾计算安全:基于DQL的用户导向的智能攻击防御策略

获取原文
获取原文并翻译 | 示例
           

摘要

Each fog node interacts with data from multiple end-users in mobile fog computing (MFC) networks. Malicious users can use a variety of programmable wireless devices to launch different modes of smart attacks such as impersonation attack, jamming attack, and eavesdropping attack between fog servers and legitimate users. The existing research in MFC lacks in the contributions of defense of smart attack and also requires in the discussions of subjective decision making by participants. Therefore, we propose a smart attack defense scheme for authorized users in MFC in this paper. First, we construct a static zero-sum game model between smart attackers and legitimate users based on prospect theory. Second, the double Q-learning (DQL) is proposed to restrain the attack motive of smart attackers in the dynamic environment. The proposed DQL method generates the optimum defense choice of legitimate users against smart attacks so that they can efficiently determine whether to use only physical layer security (PLS) to avoid those smart attacks. We use our scheme to contrast with the basic schemes, i.e., Q-learning scheme, the Sarsa scheme, and the greedy strategy. Experiment results prove that the proposed scheme can enhance the utility of legitimate users, restrain the attack motive of smart attackers, and further provide better security protection in the MFC environment.
机译:每个FOG节点与来自移动雾计算(MFC)网络中的多个最终用户的数据交互。恶意用户可以使用各种可编程的无线设备来启动不同模式的智能攻击模式,如模拟攻击,干扰攻击和迷雾服务器和合法用户之间的窃听。 MFC的现有研究缺乏对智能攻击辩护的贡献,并且还需要参与者对主观决策的讨论。因此,我们在本文中为MFC中的授权用户提出了智能攻击防范计划。首先,我们在展望理论构建智能攻击者与合法用户之间的静态零和游戏模型。其次,提出了双Q学习(DQL)来限制动态环境中智能攻击者的攻击动机。所提出的DQL方法为智能攻击产生合法用户的最佳防御选择,以便他们可以有效地确定是否仅使用物理层安全性(PLS)来避免那些智能攻击。我们使用计划与基本方案,即Q学习计划,Sarsa计划和贪婪战略进行鲜明对比。实验结果证明,该方案可以增强合法用户的效用,抑制智能攻击者的攻击动机,并在MFC环境中进一步提供更好的安全保护。

著录项

  • 来源
    《Computer Communications》 |2020年第7期|790-798|共9页
  • 作者单位

    Beijing Univ Technol Fac Informat Technol Beijing 100124 Peoples R China|Beijing Electromech Engn Inst Beijing 100074 Peoples R China;

    Beijing Univ Technol Fac Informat Technol Beijing 100124 Peoples R China|Ghulam Ishaq Khan Inst Engn Sci & Technol Dept Comp Sci & Engn Kpk 23460 Pakistan;

    Beijing Univ Technol Fac Informat Technol Beijing 100124 Peoples R China;

    Namal Inst Dept Comp Sci Mianwali 42250 Pakistan|Edith Cowan Univ Sch Engn Perth WA 6027 Australia;

    Prince Sultan Univ Dept Comp Sci Robot & Internet Things Res Lab R&D Gaitech Robot Riyadh Saudi Arabia|CISTER INESC TEC Porto Portugal|ISEP IPP Porto Portugal;

    Ghulam Ishaq Khan Inst Engn Sci & Technol Dept Comp Sci & Engn Kpk 23460 Pakistan;

    Feng Chia Univ Dept Informat Engn & Comp Sci Taichung 40724 Taiwan|Hangzhou Dianzi Univ Sch Comp Sci & Technol Hangzhou 310018 Zhejiang Peoples R China;

    Chinese Acad Sci Inst Informat Engn Beijing 100195 Peoples R China;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Mobile fog computing; Smart attack; Prospect theory; Reinforcement learning; Game theory; Physical layer security;

    机译:移动雾计算;智能攻击;展望理论;加固学习;博弈论;物理层安全;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号