SECURITY IN MOBILE EDGE CACHING WITH REINFORCEMENT LEARNING

被引:180
作者
Xiao, Liang [1 ,2 ]
Wan, Xiaoyue [1 ]
Dai, Canhuang [1 ]
Du, Xiaojiang [3 ]
Chen, Xiang [4 ]
Guizani, Mohsen [5 ]
机构
[1] Xiamen Univ, Dept Commun Engn, Xiamen, Fujian, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing, Jiangsu, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Xiamen Univ, Guangzhou, Guangdong, Peoples R China
[5] Univ Idaho, Moscow, ID 83843 USA
基金
中国国家自然科学基金;
关键词
GAME;
D O I
10.1109/MWC.2018.1700291
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile edge computing usually uses caching to support multimedia contents in 5G mobile Internet to reduce the computing overhead and latency. Mobile edge caching (MEC) systems are vulnerable to various attacks such as denial of service attacks and rogue edge attacks. This article investigates the attack models in MEC systems, focusing on both the mobile offloading and the caching procedures. In this article, we propose security solutions that apply reinforcement learning (RL) techniques to provide secure offloading to the edge nodes against jamming attacks. We also present lightweight authentication and secure collaborative caching schemes to protect data privacy. We evaluate the performance of the RL-based security solution for mobile edge caching and discuss the challenges that need to be addressed in the future.
引用
收藏
页码:116 / 122
页数:7
相关论文
共 15 条
[11]   Cloud-Based Malware Detection Game for Mobile Devices with Offloading [J].
Xiao, Liang ;
Li, Yanda ;
Huang, Xueli ;
Du, XiaoJiang .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (10) :2742-2750
[12]   A Mobile Offloading Game Against Smart Attacks [J].
Xiao, Liang ;
Xie, Caixia ;
Chen, Tianhua ;
Dai, Huaiyu ;
Poor, H. Vincent .
IEEE ACCESS, 2016, 4 :2281-2291
[13]   A survey of key management schemes in wireless sensor networks [J].
Xiao, Yang ;
Rayi, Venkata Krishna ;
Sun, Bo ;
Du, Xiaojiang ;
Hu, Fei ;
Galloway, Michael .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2314-2341
[14]  
Xiaofan He, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P1787, DOI 10.1109/INFOCOM.2015.7218560
[15]  
Xie C., 2016, P IEEE INT C UB WIR, VPP, P1