4.7 Article

Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL

期刊

COMPUTER COMMUNICATIONS
卷 160, 期 -, 页码 790-798

出版社

ELSEVIER
DOI: 10.1016/j.comcom.2020.06.019

关键词

Mobile fog computing; Smart attack; Prospect theory; Reinforcement learning; Game theory; Physical layer security

资金

  1. China National Key RD Program [2018YFB0803600]
  2. National Natural Science Foundation of China [61801008]
  3. Beijing Municipal Natural Science Foundation, China [L172049]
  4. Scientific Research Common Program of Beijing Municipal Education Commission, China [KM201910005025]
  5. Defense Industrial Technology Development Program, China [JCKY2016204A102]

向作者/读者索取更多资源

Each fog node interacts with data from multiple end-users in mobile fog computing (MFC) networks. Malicious users can use a variety of programmable wireless devices to launch different modes of smart attacks such as impersonation attack, jamming attack, and eavesdropping attack between fog servers and legitimate users. The existing research in MFC lacks in the contributions of defense of smart attack and also requires in the discussions of subjective decision making by participants. Therefore, we propose a smart attack defense scheme for authorized users in MFC in this paper. First, we construct a static zero-sum game model between smart attackers and legitimate users based on prospect theory. Second, the double Q-learning (DQL) is proposed to restrain the attack motive of smart attackers in the dynamic environment. The proposed DQL method generates the optimum defense choice of legitimate users against smart attacks so that they can efficiently determine whether to use only physical layer security (PLS) to avoid those smart attacks. We use our scheme to contrast with the basic schemes, i.e., Q-learning scheme, the Sarsa scheme, and the greedy strategy. Experiment results prove that the proposed scheme can enhance the utility of legitimate users, restrain the attack motive of smart attackers, and further provide better security protection in the MFC environment.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据