Mobile Offloading Game Against Smart Attacks

被引:0
作者
Xiao, Liang [1 ,2 ]
Xie, Caixia [1 ]
Chen, Tianhua [1 ]
Dai, Huaiyu [3 ]
Poor, H. Vincent [4 ]
机构
[1] Xiamen Univ, Dept CE, Xiamen, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing Key Lab IOT Informat Secur Technol, Beijing, Peoples R China
[3] North Carolina State Univ, Dept ECE, Raleigh, NC 27695 USA
[4] Princeton Univ, Dept EE, Princeton, NJ 08544 USA
来源
2016 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS) | 2016年
关键词
Mobile offloading; spoofing; jamming; game theory; smart attacks; big data; SYSTEMS; CHANNEL;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile cloud computing enables mobile devices such as smartphones to offload data to clouds via access points or base stations to reduce energy consumption and improve their user experience. However, mobile offloading is vulnerable to smart attackers that can exploit software defined radios to perform multiple types of attacks, such as spoofing and jamming, based on the status of radio environments and the offloading process. In this paper, a mobile offloading game against smart attacks, in which a mobile device chooses its offloading rate, a smart attacker chooses the type of its attack, and a security agent decides whether to initiate full data protection for the offloading, is investigated. The interactions among a mobile device, a smart attacker and a security agent are formulated as a secure mobile offloading game. The Nash equilibrium (NE) and its existence conditions are provided for the static secure offloading game. A Q-learning based mobile offloading strategy is proposed for dynamic environments to address smart attacks, in which the mobile device is unaware of the system parameters. Simulation results show that the proposed offloading strategy improves both the offloading rate and the security performance.
引用
收藏
页数:6
相关论文
共 19 条
  • [1] [Anonymous], 2011, LECT NOTES ELECT ENG
  • [2] [Anonymous], 2007, Int. Conf. Advanced Info. Netw. and Applicat. Workshops
  • [3] A comprehensive survey of multiagent reinforcement learning
    Busoniu, Lucian
    Babuska, Robert
    De Schutter, Bart
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2008, 38 (02): : 156 - 172
  • [4] Decentralized Computation Offloading Game for Mobile Cloud Computing
    Chen, Xu
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (04) : 974 - 983
  • [5] Garnaev A., 2014, LNICST, V129, P146
  • [6] Incorporating Attack-Type Uncertainty Into Network Protection
    Garnaev, Andrey
    Baykal-Gursoy, Melike
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (08) : 1278 - 1287
  • [7] Hu P., 2015, P IEEE INT C COMP CO
  • [8] CLOUD COMPUTING FOR MOBILE USERS: CAN OFFLOADING COMPUTATION SAVE ENERGY?
    Kumar, Karthik
    Lu, Yung-Hsiang
    [J]. COMPUTER, 2010, 43 (04) : 51 - 56
  • [9] Li YD, 2015, IEEE CONF COMPUT, P197, DOI 10.1109/INFCOMW.2015.7179384
  • [10] Li Z., 2001, P ACM INT C COMPILER, P238, DOI DOI 10.1145/502217.502257