skip to main content
10.1145/3586102.3586105acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing

Authors Info & Claims
Published:24 July 2023Publication History

ABSTRACT

Fog computing is a technology that provides distributed computing, storage and other services between cloud servers and Internet of Things(IoT) devices. It reduces the pressure on cloud servers and utilizes network edges for computing and storage, thereby improving the performance of the entire IoT system. Since fog computing uses traditional security technologies to realize the communication between fog nodes and end users, it is inevitable for fog computing to face some security threats, such as eavesdropping attacks, camouflage attacks and other security threats. Aiming at this problem, this paper proposes a impersonation attack detection scheme based on Sarsa(lambda) algorithm. The scheme first builds a camouflage attack model and a key generation model based on physical layer security technology, then performs hypothesis testing at the receiving end to verify the legitimacy of the training signal, and then obtains the optimal threshold through the proposed algorithm. The optimal threshold realizes the terminal communication security between user nodes and fog nodes. The experimental results show that the algorithm can effectively detect camouflage attacks in a dynamic fog computing environment and have a low average detection error rate. When , AER decreased to 0.4925.

References

  1. Niroshinie Fernando, Seng W. Loke, and Wenny Rahayu. 2013. Mobile cloud computing. Future Gener. Comput. Syst. 29, 1 (January, 2013), 84–106. https://doi.org/10.1016/j.future.2012.05.023Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Zhanyu Ma, Jiyang Xie, Hailong Li, Qie Sun, Zhongwei Si, Jianhua Zhang, and Jun Guo. 2017. The Role of Data Analysis in the Development of Intelligent Energy Networks. IEEE Network. 31, 5 (September 2017), 88-95. https://doi.org/10.1109/MNET.2017.1600319Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Hong Zhang, Jinbo Zhang and Yun Zhou. 2019. Research on physical layer security technology of large-scale distributed system. Radio Engineering. 49, 1 (January 2019), 1-5. https://doi.org/10.3969 /j.issn.1003−3106.2019.01.01Google ScholarGoogle Scholar
  4. Smriti Gopinath, Ren Guillaume, Paul Duplys and Andreas Czylwik. 2014. Reciprocity enhancement and decorrelation schemes for PHY-based key generation. 2014 IEEE Globecom Workshops (GC Wkshps). 1367-1372. https://doi.org/10.1109/GLOCOMW.2014.7063624Google ScholarGoogle ScholarCross RefCross Ref
  5. Chan D. T. Thai, Jemin Lee and Tony Q. S. Quek. 2016. Physical-Layer Secret Key Generation With Colluding Untrusted Relays. IEEE Transactions on Wireless Communications. 15, 2 (October 2016), 1517-1530. https://doi.org/10.1109/TWC.2015.2491935Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Wenbin Huang, Wenjuan Tang, Hongbo Jiang, Jun Luo and Yaoxue Zhang. 2022. Stop Deceiving! An Effective Defense Scheme Against Voice Impersonation Attacks on Smart Devices. IEEE Internet of Things Journal. 9, 7 (April 2022), 5304-5314. https://doi.org/ 10.1109/JIOT.2021.3110588Google ScholarGoogle ScholarCross RefCross Ref
  7. Yuxuan Xu, Ming Liu, Linning Peng, Junqing Zhang and Yawen Zheng. 2022. Colluding RF Fingerprint Impersonation Attack Based on Generative Adversarial Network. ICC 2022 - IEEE International Conference on Communications. (May 2022), 3220-3225. https://doi.org/ 10.1109/ICC45855.2022.9838574Google ScholarGoogle ScholarCross RefCross Ref
  8. Sidney J. Golstein, François Rottenberg, François Horlin, Philippe De Doncker and Julien Sarrazin. 2022. Physical Layer Security in an OFDM Time Reversal SISO Communication With Imperfect Channel State Information. IEEE Access. 10, (March 2022), 26778-26794. https://doi.org/10.1109/ACCESS.2022.3155594Google ScholarGoogle ScholarCross RefCross Ref
  9. Hoomaan Moradimaryamnegari, Marco Frego, Angelika Peer. 2022. Model Predictive Control-Based Reinforcement Learning Using Expected Sarsa. IEEE Access. 10, (), 81177-81191. https://doi.org/10.1109/ACCESS.2022.3195530Google ScholarGoogle ScholarCross RefCross Ref
  10. Yuexing Peng, Peng Wang, Wei Xiang and Yonghui Li. 2017. Secret Key Generation Based on Estimated Channel State Information for TDD-OFDM Systems Over Fading Channels. IEEE Transactions on Wireless Communications. 16, 8 (May 2017), 5176-5186. https://doi.org/10.1109/TWC.2017.2706657Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Shanshan Tu, Muhammad Waqas, Sadqat U. Rehman, Muhammad Aamir, Obaid U. Rehman, Zhangjian Biao and Chin-Chen Chang. 2018. Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack. IEEE Access. 6 (December 2018), 74993-75001. https://doi.org/10.1109/ACCESS.2018.2884672Google ScholarGoogle ScholarCross RefCross Ref
  12. Shanshan Tu, Muhammad Waqas, Ur Sadaqat, Talha Mir, Ghulam Abbas, Ziaul H. Abbas, Zahid Halim and Iftekhar Ahmad. 2021. Reinforcement Learning Assisted Impersonation Attack Detection in Device-to-Device Communications. IEEE Transactions on Vehicular Technology. 70, 2 (January 2021), 1474-1479. https://doi.org/10.1109/TVT.2021.3053015Google ScholarGoogle ScholarCross RefCross Ref
  13. Bin Zhang, Muhammad Waqas, Shanshan Tu, Syed M. Hussain and Sadaqat U. Rehman. 2021. Power Allocation Strategy for Secret Key Generation Method in Wireless Communications. Computers, Materials & Continua. 68, 2 (February 2021), 2179-2888. https://doi.org/10.32604/cmc.2021.016553Google ScholarGoogle ScholarCross RefCross Ref
  14. Junqing Zhang, Trung Q. Duong, Alan Marshall and Roger Woods. 2016. Key Generation From Wireless Channels: A Review. IEEE Access. 4, (January 2016), 614-626. https://doi.org/10.1109/ACCESS.2016.2521718Google ScholarGoogle ScholarCross RefCross Ref
  15. Kai Zeng. 2015. Physical layer key generation in wireless networks: challenges and opportunities. IEEE Communications Magazine. 53, 6 (June 2015), 33-39. https://doi.org/10.1109/MCOM.2015.7120014Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Nasser Aldaghri and Hessam Mahdavifar. 2020. Physical Layer Secret Key Generation in Static Environments. IEEE Transactions on Information Forensics and Security. 15, (February 2020), 2692-2705. https://doi.org/10.1109/TIFS.2020.2974621Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. James R. Riehl and Ming Cao. 2018. A Centrality-Based Security Game for Multihop Networks. IEEE Transactions on Control of Network Systems. 5, 4 (December 2018), 1507-1516. https://doi.org/10.1109/TCNS.2017.2728202Google ScholarGoogle ScholarCross RefCross Ref
  18. Zhanyu Ma and Arne Leijon. 2011. Bayesian Estimation of Beta Mixture Models with Variational Inference. IEEE Transactions on Pattern Analysis and Machine Intelligence. 33, 11 (November 2011), 2160-2173. https://doi.org/10.1109/TPAMI.2011.63Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Michael Ganger, Ethan Duryea and Wei Hu. 2016. Double Sarsa and double expected Sarsa with shallow and deep learning. Journal of Data Analysis and Information Processing. 4, 4 (November 2016), 159—176. https://doi.org/10.4236/jdaip.2016.44014Google ScholarGoogle ScholarCross RefCross Ref
  20. Huan Zhang, Kangfeng Zheng, Xiujuan Wang, Shoushan Luo and Bin Wu. 2020. Strategy selection for moving target defense in incomplete information game. Computers, Materials & Continua. 62, 2 , 763—786. https://doi.org/10.32604/cmc.2020.06553Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICCNS '22: Proceedings of the 2022 12th International Conference on Communication and Network Security
        December 2022
        241 pages
        ISBN:9781450397520
        DOI:10.1145/3586102

        Copyright © 2022 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 24 July 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)18
        • Downloads (Last 6 weeks)3

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format