SECURITY IN MOBILE EDGE CACHING WITH REINFORCEMENT LEARNING

被引:180
作者
Xiao, Liang [1 ,2 ]
Wan, Xiaoyue [1 ]
Dai, Canhuang [1 ]
Du, Xiaojiang [3 ]
Chen, Xiang [4 ]
Guizani, Mohsen [5 ]
机构
[1] Xiamen Univ, Dept Commun Engn, Xiamen, Fujian, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing, Jiangsu, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Xiamen Univ, Guangzhou, Guangdong, Peoples R China
[5] Univ Idaho, Moscow, ID 83843 USA
基金
中国国家自然科学基金;
关键词
GAME;
D O I
10.1109/MWC.2018.1700291
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile edge computing usually uses caching to support multimedia contents in 5G mobile Internet to reduce the computing overhead and latency. Mobile edge caching (MEC) systems are vulnerable to various attacks such as denial of service attacks and rogue edge attacks. This article investigates the attack models in MEC systems, focusing on both the mobile offloading and the caching procedures. In this article, we propose security solutions that apply reinforcement learning (RL) techniques to provide secure offloading to the edge nodes against jamming attacks. We also present lightweight authentication and secure collaborative caching schemes to protect data privacy. We evaluate the performance of the RL-based security solution for mobile edge caching and discuss the challenges that need to be addressed in the future.
引用
收藏
页码:116 / 122
页数:7
相关论文
共 15 条
[1]  
Aref M. A., 2017, 2017 IEEE WIRELESS C, P1
[2]   An effective key management scheme for heterogeneous sensor networks [J].
Du, Xiaojiang ;
Xiao, Yang ;
Guizani, Mohsen ;
Chen, Hslao-Hwa .
AD HOC NETWORKS, 2007, 5 (01) :24-34
[3]  
Gwon Y, 2013, IEEE CONF COMM NETW, P28, DOI 10.1109/CNS.2013.6682689
[4]  
Han GA, 2017, INT CONF ACOUST SPEE, P2087, DOI 10.1109/ICASSP.2017.7952524
[5]   MACHINE LEARNING PARADIGMS FOR NEXT-GENERATION WIRELESS NETWORKS [J].
Jiang, Chunxiao ;
Zhang, Haijun ;
Ren, Yong ;
Han, Zhu ;
Chen, Kwang-Cheng ;
Hanzo, Lajos .
IEEE WIRELESS COMMUNICATIONS, 2017, 24 (02) :98-105
[6]   A Survey on Mobile Edge Computing: The Communication Perspective [J].
Mao, Yuyi ;
You, Changsheng ;
Zhang, Jun ;
Huang, Kaibin ;
Letaief, Khaled B. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (04) :2322-2358
[7]   Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges [J].
Roman, Rodrigo ;
Lopez, Javier ;
Mambo, Masahiro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :680-698
[8]   NON-ORTHOGONAL MULTIPLE ACCESS: A LNIFIED PERSPECTIVE [J].
Wang, Qi ;
Zhang, Rong ;
Yang, Lie-Liang ;
Hanzo, Lajos .
IEEE WIRELESS COMMUNICATIONS, 2018, 25 (02) :10-16
[9]   Anti-Jamming Games in Multi-Channel Cognitive Radio Networks [J].
Wu, Yongle ;
Wang, Beibei ;
Liu, K. J. Ray ;
Clancy, T. Charles .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (01) :4-15
[10]  
Xiao L., 2016, IEEE T VEH TECHNOL, V65, P10