Node State Monitoring Scheme in Fog Radio Access Networks for Intrusion Detection

被引:12
作者
An, Xingshuo [1 ]
Lu, Xing [1 ]
Yang, Lei [2 ]
Zhou, Xianwei [1 ]
Lin, Fuhong [1 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Univ Nevada, Dept Comp Sci & Engn, Reno, NV 89557 USA
基金
国家重点研发计划; 美国国家科学基金会;
关键词
5G; fog computing; IDS; skyline query; node monitoring; FNFS; ARCHITECTURE; INTERNET; SYSTEM; CLOUD;
D O I
10.1109/ACCESS.2019.2899017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies intrusion detection for fog computing in fog radio access networks (F-RANs). As fog nodes are resource constrained, a traditional intrusion detection system (IDS) cannot be directly deployed in F-RANs due to the communication overhead and computational complexity. To address this challenge, we propose a skyline query-based scheme that can analyze the IDS log statistics of fog nodes and provide a complete data processing flow. Specifically, a three-step solution is proposed. First, a lightweight fog node filtering strategy is proposed to filter the raw data, which can reduce the fog-cloud communication overhead. Second, a sliding-window-based mechanism is developed in the cloud server to efficiently process the asynchronous data flow. Then, using the pre-processed data, a set of seriously attacked nodes will be identified by the skyline query. Third, the security threat level of each individual fog node is calculated using the unascertained measure, which can determine the degree of security threat. The numerical simulations show that the proposed scheme can significantly reduce communication overhead and computational complexity.
引用
收藏
页码:21879 / 21888
页数:10
相关论文
共 36 条
[11]   Re-ADP: Real-Time Data Aggregation with Adaptive ω-Event Differential Privacy for Fog Computing [J].
Huo, Yan ;
Yong, Chengtao ;
Lu, Yanfei .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
[12]   JAMMING STRATEGIES FOR PHYSICAL LAYER SECURITY [J].
Huo, Yan ;
Tian, Yuqi ;
Ma, Liran ;
Cheng, Xiuzhen ;
Jing, Tao .
IEEE WIRELESS COMMUNICATIONS, 2018, 25 (01) :148-153
[13]   LoDPD: A Location Difference-Based Proximity Detection Protocol for Fog Computing [J].
Huo, Yan ;
Hu, Chunqiang ;
Qi, Xiaowei ;
Jing, Tao .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1117-1124
[14]   A Novel Utility Based Resource Management Scheme in Vehicular Social Edge Computing [J].
Lin, Fuhong ;
Lu, Xing ;
You, Ilsun ;
Zhou, Xianwei .
IEEE ACCESS, 2018, 6 :66673-66684
[15]   Optimization-Oriented Resource Allocation Management for Vehicular Fog Computing [J].
Lin, Fuhong ;
Zhou, Yutong ;
Pau, Giovanni ;
Collotta, Mario .
IEEE ACCESS, 2018, 6 :69294-69303
[16]   Fair Resource Allocation in an Intrusion-Detection System for Edge Computing Ensuring the security of Internet of Things devices [J].
Lin, Fuhong ;
Zhou, Yutong ;
An, Xingsuo ;
You, Ilsun ;
Choo, Kim-Kwang Raymond .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2018, 7 (06) :45-50
[17]   User Access Management Based on Network Pricing for Social Network Applications [J].
Lin, Fuhong ;
Pang, Zhibo ;
Ma, Xingmin ;
Gu, Qing .
SENSORS, 2018, 18 (02)
[18]   Securing Fog Computing for Internet of Things Applications: Challenges and Solutions [J].
Ni, Jianbing ;
Zhang, Kuan ;
Lin, Xiaodong ;
Shen, Xuemin .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01) :601-628
[19]   From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework [J].
Osanaiye, Opeyemi ;
Chen, Shuo ;
Yan, Zheng ;
Lu, Rongxing ;
Choo, Kim-Kwang Raymond ;
Dlodlo, Mqhele .
IEEE ACCESS, 2017, 5 :8284-8300
[20]  
Papapetrou O, 2014, PROC INT CONF DATA, P124, DOI 10.1109/ICDE.2014.6816645