ABSTRACT
Fog computing is a technology that provides distributed computing, storage and other services between cloud servers and Internet of Things(IoT) devices. It reduces the pressure on cloud servers and utilizes network edges for computing and storage, thereby improving the performance of the entire IoT system. Since fog computing uses traditional security technologies to realize the communication between fog nodes and end users, it is inevitable for fog computing to face some security threats, such as eavesdropping attacks, camouflage attacks and other security threats. Aiming at this problem, this paper proposes a impersonation attack detection scheme based on Sarsa(lambda) algorithm. The scheme first builds a camouflage attack model and a key generation model based on physical layer security technology, then performs hypothesis testing at the receiving end to verify the legitimacy of the training signal, and then obtains the optimal threshold through the proposed algorithm. The optimal threshold realizes the terminal communication security between user nodes and fog nodes. The experimental results show that the algorithm can effectively detect camouflage attacks in a dynamic fog computing environment and have a low average detection error rate. When , AER decreased to 0.4925.
- Niroshinie Fernando, Seng W. Loke, and Wenny Rahayu. 2013. Mobile cloud computing. Future Gener. Comput. Syst. 29, 1 (January, 2013), 84–106. https://doi.org/10.1016/j.future.2012.05.023Google ScholarDigital Library
- Zhanyu Ma, Jiyang Xie, Hailong Li, Qie Sun, Zhongwei Si, Jianhua Zhang, and Jun Guo. 2017. The Role of Data Analysis in the Development of Intelligent Energy Networks. IEEE Network. 31, 5 (September 2017), 88-95. https://doi.org/10.1109/MNET.2017.1600319Google ScholarDigital Library
- Hong Zhang, Jinbo Zhang and Yun Zhou. 2019. Research on physical layer security technology of large-scale distributed system. Radio Engineering. 49, 1 (January 2019), 1-5. https://doi.org/10.3969 /j.issn.1003−3106.2019.01.01Google Scholar
- Smriti Gopinath, Ren Guillaume, Paul Duplys and Andreas Czylwik. 2014. Reciprocity enhancement and decorrelation schemes for PHY-based key generation. 2014 IEEE Globecom Workshops (GC Wkshps). 1367-1372. https://doi.org/10.1109/GLOCOMW.2014.7063624Google ScholarCross Ref
- Chan D. T. Thai, Jemin Lee and Tony Q. S. Quek. 2016. Physical-Layer Secret Key Generation With Colluding Untrusted Relays. IEEE Transactions on Wireless Communications. 15, 2 (October 2016), 1517-1530. https://doi.org/10.1109/TWC.2015.2491935Google ScholarDigital Library
- Wenbin Huang, Wenjuan Tang, Hongbo Jiang, Jun Luo and Yaoxue Zhang. 2022. Stop Deceiving! An Effective Defense Scheme Against Voice Impersonation Attacks on Smart Devices. IEEE Internet of Things Journal. 9, 7 (April 2022), 5304-5314. https://doi.org/ 10.1109/JIOT.2021.3110588Google ScholarCross Ref
- Yuxuan Xu, Ming Liu, Linning Peng, Junqing Zhang and Yawen Zheng. 2022. Colluding RF Fingerprint Impersonation Attack Based on Generative Adversarial Network. ICC 2022 - IEEE International Conference on Communications. (May 2022), 3220-3225. https://doi.org/ 10.1109/ICC45855.2022.9838574Google ScholarCross Ref
- Sidney J. Golstein, François Rottenberg, François Horlin, Philippe De Doncker and Julien Sarrazin. 2022. Physical Layer Security in an OFDM Time Reversal SISO Communication With Imperfect Channel State Information. IEEE Access. 10, (March 2022), 26778-26794. https://doi.org/10.1109/ACCESS.2022.3155594Google ScholarCross Ref
- Hoomaan Moradimaryamnegari, Marco Frego, Angelika Peer. 2022. Model Predictive Control-Based Reinforcement Learning Using Expected Sarsa. IEEE Access. 10, (), 81177-81191. https://doi.org/10.1109/ACCESS.2022.3195530Google ScholarCross Ref
- Yuexing Peng, Peng Wang, Wei Xiang and Yonghui Li. 2017. Secret Key Generation Based on Estimated Channel State Information for TDD-OFDM Systems Over Fading Channels. IEEE Transactions on Wireless Communications. 16, 8 (May 2017), 5176-5186. https://doi.org/10.1109/TWC.2017.2706657Google ScholarDigital Library
- Shanshan Tu, Muhammad Waqas, Sadqat U. Rehman, Muhammad Aamir, Obaid U. Rehman, Zhangjian Biao and Chin-Chen Chang. 2018. Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack. IEEE Access. 6 (December 2018), 74993-75001. https://doi.org/10.1109/ACCESS.2018.2884672Google ScholarCross Ref
- Shanshan Tu, Muhammad Waqas, Ur Sadaqat, Talha Mir, Ghulam Abbas, Ziaul H. Abbas, Zahid Halim and Iftekhar Ahmad. 2021. Reinforcement Learning Assisted Impersonation Attack Detection in Device-to-Device Communications. IEEE Transactions on Vehicular Technology. 70, 2 (January 2021), 1474-1479. https://doi.org/10.1109/TVT.2021.3053015Google ScholarCross Ref
- Bin Zhang, Muhammad Waqas, Shanshan Tu, Syed M. Hussain and Sadaqat U. Rehman. 2021. Power Allocation Strategy for Secret Key Generation Method in Wireless Communications. Computers, Materials & Continua. 68, 2 (February 2021), 2179-2888. https://doi.org/10.32604/cmc.2021.016553Google ScholarCross Ref
- Junqing Zhang, Trung Q. Duong, Alan Marshall and Roger Woods. 2016. Key Generation From Wireless Channels: A Review. IEEE Access. 4, (January 2016), 614-626. https://doi.org/10.1109/ACCESS.2016.2521718Google ScholarCross Ref
- Kai Zeng. 2015. Physical layer key generation in wireless networks: challenges and opportunities. IEEE Communications Magazine. 53, 6 (June 2015), 33-39. https://doi.org/10.1109/MCOM.2015.7120014Google ScholarDigital Library
- Nasser Aldaghri and Hessam Mahdavifar. 2020. Physical Layer Secret Key Generation in Static Environments. IEEE Transactions on Information Forensics and Security. 15, (February 2020), 2692-2705. https://doi.org/10.1109/TIFS.2020.2974621Google ScholarDigital Library
- James R. Riehl and Ming Cao. 2018. A Centrality-Based Security Game for Multihop Networks. IEEE Transactions on Control of Network Systems. 5, 4 (December 2018), 1507-1516. https://doi.org/10.1109/TCNS.2017.2728202Google ScholarCross Ref
- Zhanyu Ma and Arne Leijon. 2011. Bayesian Estimation of Beta Mixture Models with Variational Inference. IEEE Transactions on Pattern Analysis and Machine Intelligence. 33, 11 (November 2011), 2160-2173. https://doi.org/10.1109/TPAMI.2011.63Google ScholarDigital Library
- Michael Ganger, Ethan Duryea and Wei Hu. 2016. Double Sarsa and double expected Sarsa with shallow and deep learning. Journal of Data Analysis and Information Processing. 4, 4 (November 2016), 159—176. https://doi.org/10.4236/jdaip.2016.44014Google ScholarCross Ref
- Huan Zhang, Kangfeng Zheng, Xiujuan Wang, Shoushan Luo and Bin Wu. 2020. Strategy selection for moving target defense in incomplete information game. Computers, Materials & Continua. 62, 2 , 763—786. https://doi.org/10.32604/cmc.2020.06553Google ScholarCross Ref
Index Terms
- Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing
Recommendations
Fog Computing: Issues and Challenges in Security and Forensics
COMPSAC '15: Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference - Volume 03Although Fog Computing is defined as the extension of the Cloud Computing paradigm, its distinctive characteristics in the location sensitivity, wireless connectivity, and geographical accessibility create new security and forensics issues and ...
A Pattern for Fog Computing
VikingPLoP '16: Proceedings of the 10th Travelling Conference on Pattern Languages of ProgramsFog Computing is a new variety of the cloud computing paradigm that brings virtualized cloud services to the edge of the network to control the devices in the IoT. We present a pattern for fog computing which describes its architecture, including its ...
Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing
This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and "pay-as-you-go" computing potential and on-demand provisioning of services. Governments, as well as organizations, ...
Comments