SECHO: A deep reinforcement learning-based scheme for secure handover in mobile edge computing

被引:4
作者
Cheng, Zhimo [1 ]
Ji, Xinsheng [1 ,2 ]
You, Wei [1 ]
Zhao, Yu [1 ]
Guo, Zhongfu [1 ]
机构
[1] Informat Engn Univ, Zhengzhou 450002, Peoples R China
[2] Purple Mt Lab Networking Commun & Secur, Nanjing 211111, Peoples R China
关键词
Mobile edge computing; Mobility management; Handover security; Deep reinforcement learning; SCHEDULING ALGORITHM; BLOCKCHAIN; EFFICIENT; WORKFLOW; PRIVACY;
D O I
10.1016/j.comnet.2023.109769
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The experience of users in Mobile Edge Computing (MEC) highly depends on data offloading whose major bottle neck is the design of handover scheme. Existing research advocates that offloading security and quality of service (QoS) should be both considered for an optimal handover. However, recent studies concentrate on improving QoS while neglect security. Due to the complexity of MEC scenarios, generating an optimal handover scheme improving both QoS and security remains a challenge. To solve this problem, we propose SECHO, a secure handover scheme for blockchain-based single-user mobile edge computing system. Then, we design a security policy selection algorithm of offloading tasks to guarantees security performance and controls overhead. Finally, we customize the neural network for a deep reinforcement learning algorithm to realize optimal handover, where a security policy selection method is engaged to collaboratively enhance offloading QoS while decreasing underlying risks. Simulation results show that SECHO leads a 29.6%-302% advantage in overall performance than existing approaches. It proves that our proposal is effective to achieve secure handover while not degrading offloading QoS.
引用
收藏
页数:12
相关论文
共 47 条
[1]   Mobile Edge Computing: A Survey [J].
Abbas, Nasir ;
Zhang, Yan ;
Taherkordi, Amir ;
Skeie, Tor .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01) :450-465
[2]   Handover authentication latency reduction using mobile edge computing and mobility patterns [J].
Abdullah, Fatima ;
Kimovski, Dragi ;
Prodan, Radu ;
Munir, Kashif .
COMPUTING, 2021, 103 (11) :2667-2686
[3]   Mobility management solutions for 5G networks: Architecture and services [J].
Akkari, Nadine ;
Dimitriou, Nikos .
COMPUTER NETWORKS, 2020, 169
[4]   Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review [J].
Ali, Belal ;
Gregory, Mark A. ;
Li, Shuo .
IEEE ACCESS, 2021, 9 (09) :18706-18721
[5]   DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds [J].
Bessani, Alysson ;
Correia, Miguel ;
Quaresma, Bruno ;
Andre, Fernando ;
Sousa, Paulo .
ACM TRANSACTIONS ON STORAGE, 2013, 9 (04)
[6]   Computation Peer Offloading for Energy-Constrained Mobile Edge Computing in Small-Cell Networks [J].
Chen, Lixing ;
Zhou, Sheng ;
Xu, Jie .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (04) :1619-1632
[7]  
Chen S., 2023, INT J COMMUN SYST, V36, P1
[8]  
Cherdantseva Yulia, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P546, DOI 10.1109/ARES.2013.72
[9]   Optimizing deadline violation time and energy consumption of IoT jobs in fog-cloud computing [J].
Dabiri, Samaneh ;
Azizi, Sadoon ;
Abdollahpouri, Alireza .
NEURAL COMPUTING & APPLICATIONS, 2022, 34 (23) :21157-21173
[10]   Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks [J].
Elgendy, Ibrahim A. ;
Zhang, Wei-Zhe ;
Zeng, Yiming ;
He, Hui ;
Tian, Yu-Chu ;
Yang, Yuanyuan .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (04) :2410-2422