Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Intelligent attack defense scheme based on DQL algorithm in mobile fog computing

Published: 01 December 2019 Publication History

Abstract

Fog computing is a technology that can expands the network computing mode of cloud computing and extends network computing from the network center to the network edge. It adds fog layer between cloud data center layer and Internet of Things (IoT) device layer, and provides data storage, processing, forwarding and other functions for devices using the network edge. In mobile fog computing (MFC) networks, fog nodes communicate with end users through wireless networks. Malicious users can choose different attack modes to attack legitimate users. There is a lack of research on the subjective choice of attack modes for malicious users in current work. To solve this problem, an intelligent attack defense scheme based on Double Q-learning (DQL) algorithm in MFC is proposed. Firstly, the security model involving malicious users in MFC is described. Based on Prospect Theory (PT), a static method of subjective zero-sum game between malicious users and legitimate users is constructed. Secondly, a dynamic subjective game scheme based on DQL algorithm is proposed to resist intelligent attacks. The simulation results show that compared with the Q-learning-based method for resisting intelligent attacks, the proposed method can enhance the security of MFC network and enhance the protection performance.

References

[1]
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash, Internet of things: a survey on enabling technologies, protocols, and applications, IEEE Commun. Surv. Tutor. 17 (4) (2015) 2347–2376.
[2]
M. Mukherjee, L. Shu, D. Wang, Survey of fog computing: Fundamental, network applications, and research challenges, IEEE Commun. Surveys Tuts. 20 (3) (2018) 1826–1857.
[3]
“Cisco visual networking index: Global mobile data traffic forecast update, 2013–2018,” Cisco, San Jose, CA, USA, White Paper, 2017.
[4]
L.F. Bittencourt, J. Diaz-Montes, R. Buyya, O.F. Rana, M. Parashar, Mobility-aware application scheduling in fog computing, IEEE Cloud Comput. 4 (2) (2017) 26–35.
[5]
M. Mukherjee, et al., Security and privacy in fog computing: challenges, IEEE Access 5 (2017) 19293–19304.
[6]
Y. Mao, C. You, J. Zhang, K. Huang, K.B. Letaief, A survey on mobile edge computing: the communication perspective, IEEE Commun. Surveys Tuts. 19 (4) (2017) 2322–2358.
[7]
J. Ni, K. Zhang, X. Lin, X.S. Shen, Securing fog computing for internet of things applications: challenges and solutions, EEE Commun. Surveys Tuts. 20 (1) (2018) 601–628. Firstquarter.
[8]
L. Xiao, C. Xie, T. Chen, H. Dai, and H. V. Poor, “Mobile offloading game against smart attacks,” in Proc. IEEE Int’l Conf. on Comput. Commun. (INFOCOM), BigSecurity Workshop, San Francisco, CA, USA, Apr. 2016, pp. 249–254.
[9]
A. Garnaev, M. Baykal-Gursoy, H.V. Poor, A game theoretic analysis of secret and reliable communication with active and passive adversarial modes, IEEE Trans. Wireless Commun. 15 (Mar. 2016) 2155–2163.
[10]
A. Tversky, D. Kahneman, Advances in prospect theory: Cumulative representation of uncertainty, J. Risk Uncertainty 5 (Oct. 1992) 297–323.
[11]
L. Xiao, Y. Li, G. Han, G. Liu, W. Zhuang, PHY-layer spoofing detection with reinforcement learning in wireless networks, IEEE Trans. Vehicular Technol. 65 (12) (2016) 10037–10047.
[12]
S. Tu, M. Waqas, et al., Security in fog computing: a novel technique to tackle an impersonation attack, IEEE Access 6 (2018) 74993–75001.
[13]
M.C. Lee, J. Park, There is no perfect evaluator: an investigation based on prospect theory, Human Factors Ergonom. Manufact. Service Ind. 28 (2018) 383–392.
[14]
W.F. Dai, Q.Y. Zhong, C.Z. Qi, Multi-stage multi-attribute decision-making method based on the prospect theory and triangular fuzzy MULTIMOORA, Soft Comput. 2 (2018) 1–12.
[15]
D. Kahneman, A. Tversky, Prospect theory: An analysis of decision under risk, Econometrica 47 (1979) 263–291.
[16]
S.P. Rana, M. Dey, P. Siarry, Boosting content based image retrieval performance through integration of parametric & nonparametric approaches, J. Visual Commun. Image Represent. 58 (2019) 205–219.
[17]
C. Xie, L. Xiao, User-centric view of smart attacks in wireless networks, in: Proc. IEEE Int. Conf. on Ubiquitous Wireless Broadband (ICUWB), Nanjing, CA, China, 2016, pp. 1–6.
[18]
D. Prelec, The probability weighting function, Econometrica 66 (1998) 497–527.
[19]
C.J. Watkins, P. Dayan, Q-learning, Machine Learning 8 (1992) 279–292.
[20]
H.V. Hasselt, et al., Double Q-learning, Mit Press, 2010, pp. 2613–2621.
[21]
Nathanael L. Baisa, Andrew M. Wallace, Development of a N-type GM-PHD filter for multiple target, multiple type visual tracking, J. Visual Commun. Image Represent. 59 (2019) 257–271.
[22]
H.V. Hasselt, A. Guez, D. Silver, Deep reinforcement learning with double Q-learning, Comput. Sci. (2015) 2094–2100.
[23]
Souad Chaabouni, Jenny Benois-Pineau, Chokri Ben Amar: ChaboNet : design of a deep CNN for prediction of visual saliency in natural video, J. Visual Commun. Image Represent. 60 (2019) 79–93.
[24]
R.A. Virrey, C.D.S. Liyanage, M.I.B.P.H. Petra, P.E. Abas, Visual data of facial expressions for automatic pain detection, Journal of Visual Communication and Image Representation 61 (2019) 209–217.

Index Terms

  1. Intelligent attack defense scheme based on DQL algorithm in mobile fog computing
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Journal of Visual Communication and Image Representation
        Journal of Visual Communication and Image Representation  Volume 65, Issue C
        Dec 2019
        271 pages

        Publisher

        Academic Press, Inc.

        United States

        Publication History

        Published: 01 December 2019

        Author Tags

        1. Moving fog computing
        2. Intelligent attack
        3. Physical layer security
        4. Prospect theory
        5. Reinforcement learning

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 0
          Total Downloads
        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 27 Jan 2025

        Other Metrics

        Citations

        View Options

        View options

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media