skip to main content
research-article

Enhancing Security-Problem-Based Deep Learning in Mobile Edge Computing

Authors Info & Claims
Published:14 May 2022Publication History
Skip Abstract Section

Abstract

The implementation of a variety of complex and energy-intensive mobile applications by resource-limited mobile devices (MDs) is a huge challenge. Fortunately, mobile edge computing (MEC) as a new computing paragon can offer rich resources to perform all or part of the MD’s task, which greatly reduces the energy consumption of the MD and improves the quality of service (QoS) for applications. However, offloading tasks to the edge server is vulnerable to attacks such as tampering and snooping, resulting in a deep learning (DL) security feature developed by major cloud service providers. An effective security strategy method to minimize ongoing attacks in the MEC setting is proposed. The algorithm is based on the synthetic principle of a special set of strategies, and it can quickly construct suboptimal solutions even if the number of targets achieves hundreds of millions. In addition, for a given structure and a given number of patrollers, the upper bound of the protection level can be obtained, and the lower bound required for a given protection level can also be inferred. These bounds apply to universal strategies. By comparing with the previous three basic experiments, it can be proved that our algorithm is better than the previous ones in terms of security and running time.

REFERENCES

  1. [1] Basilico Nicola, Gatti Nicola, and Amigoni Francesco. 2009. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 1. International Foundation for Autonomous Agents and Multiagent Systems, 5764.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Basilico Nicola, Gatti Nicola, and Amigoni Francesco. 2012. Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder. Artificial Intelligence 184 (2012), 78123.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Basilico Nicola, Gatti Nicola, Rossi Thomas, Ceppi Sofia, and Amigoni Francesco. 2009. Extending algorithms for mobile robot patrolling in the presence of adversaries to more realistic settings. In 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, Vol. 2. IEEE, 557564.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Basilico Nicola, Gatti Nicola, and Villa Federico. 2010. Asynchronous multi-robot patrolling against intrusions in arbitrary topologies. In 24th AAAI Conference on Artificial Intelligence.Google ScholarGoogle Scholar
  5. [5] Basilico Nicola, Lanzi Andrea, and Monga Mattia. 2016. A security game model for remote software protection. In 2016 11th International Conference on Availability, Reliability and Security (ARES’16). IEEE, 437443.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Bošanskỳ Branislav, Lisỳ Viliam, Jakob Michal, and Pěchouček Michal. 2011. Computing time-dependent policies for patrolling games with mobile targets. In The 10th International Conference on Autonomous Agents and Multiagent Systems-Volume 3. International Foundation for Autonomous Agents and Multiagent Systems, 989996.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Ceccato Mariano and Tonella Paolo. 2010. Codebender: Remote software protection using orthogonal replacement. IEEE Software 28, 2 (2010), 2834.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Chen Yuanfang, Guizani Mohsen, Zhang Yan, Wang Lei, Crespi Noel, Lee Gyu Myoung, and Wu Ting. 2018. When traffic flow prediction and wireless big data analytics meet. IEEE Network 33, 3 (2018), 161167.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Chen Yuanfang, Zhang Yan, Maharjan Sabita, Alam Muhammad, and Wu Ting. 2019. Deep learning for secure mobile edge computing in cyber-physical transportation systems. IEEE Network 33, 4 (2019), 3641.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Cotton Brian. 2015. Enhancing a City’s Ability to Plan, Protect and Manage with Intelligent Video Analytics. Technical Report. Technical report, A Frost & Sullivan White Paper.Google ScholarGoogle Scholar
  11. [11] Faheem Muhammad and Gungor V. C.. 2017. MQRP: Mobile sinks-based QoS-aware data gathering protocol for wireless sensor networks-based smart grid applications in the context of industry 4.0-based on internet of things. Future Generation Computer Systems 82, (May 2017), 358374.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Faheem M., Shah S. B. H., Butt R. A., Raza B., Anwar M., Ashraf M. W., Ngadi Md. A., and Gungor V. C.. 2018. Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges. Computer Ence Review 30, Nov (2018), 130.Google ScholarGoogle Scholar
  13. [13] Fang Fei, Jiang Albert Xin, and Tambe Milind. 2013. Optimal patrol strategy for protecting moving targets with multiple mobile resources. In Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 957964.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Fu X. and Yang Y.. 2020. Modeling and analysis of cascading node-link failures in multi-sink wireless sensor networks - ScienceDirect. Reliability Engineering & System Safety 197 (2020).Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Guan Z., Xing Q., Xu M., Yang R., Liu T., and Wang Z.. 2021. MFQE 2.0: A new approach for multi-frame quality enhancement on compressed video. IEEE Transactions on Pattern Analysis and Machine Intelligence 43, 3 (2021), 949963. Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Iwendi Celestine, Srivastava Gautam, Ohyun J. O., and Javed Abdul Rehman. 2020. KeySplitWatermark: Zero watermarking algorithm for software protection against cyber-attacks. IEEE Access 8 (2020), 72650–72660. Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Jain Manish, Kardes Erim, Kiekintveld Christopher, Ordóñez Fernando, and Tambe Milind. 2010. Optimal defender allocation for massive security games: A branch and price approach. In Workshop 25: Optimisation in Multi-agent Systems. 23.Google ScholarGoogle Scholar
  18. [18] Karthikeyan K., Sunder R., Shankar K., Lakshmanaprabu S. K., Vijayakumar V., Mohamed Elhoseny, and Gunasekaran Manogaran. 2018. Energy consumption analysis of Virtual Machine migration in cloud using hybrid swarm optimization (ABC-BA). Journal of Supercomputing (2018), 117.Google ScholarGoogle Scholar
  19. [19] Kempe David, Schulman Leonard J., and Tamuz Omer. 2018. Quasi-regular sequences and optimal schedules for security games. In Proceedings of the 29th Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 16251644.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Kiekintveld Christopher, Jain Manish, Tsai Jason, Pita James, Ordóñez Fernando, and Tambe Milind. 2009. Computing optimal randomized resource allocations for massive security games. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 1. International Foundation for Autonomous Agents and Multiagent Systems, 689696.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Li X., Zhu Y., and Wang J.. 2019. Highly efficient privacy preserving location-based services with enhanced one-round blind filter. IEEE Transactions on Emerging Topics in Computing PP, 99 (2019), 11.Google ScholarGoogle Scholar
  22. [22] Lv Zhihan, Han Yang, Singh Amit Kumar, Manogaran Gunasekaran, and Lv Haibin. 2020. Trustworthiness in industrial IoT systems based on artificial intelligence. IEEE Transactions on Industrial Informatics 17, 2 (2021), 1–1. Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Manogaran Gunasekaran, Alazab Mamoun, Saravanan Vijayalakshmi, Rawal Bharat S., P. Mohamed Shakeel, Sundarasekar Revathi, Nagarajan Senthil Murugan, Kadry Seifedine, and Montenegro-Marin Carlos Enrique. 2020. Machine learning assisted information management scheme in service concentrated IoT. IEEE Transactions on Industrial Informatics (2020), 1224.Google ScholarGoogle Scholar
  24. [24] Cote Enrique Munoz de, Stranders Ruben, Basilico Nicola, Gatti Nicola, and Jennings Nick. 2013. Introducing alarms in adversarial patrolling games. In Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 12751276.Google ScholarGoogle Scholar
  25. [25] Numan Muhammad, Subhan Fazli, Khan Wazir Zada, Hakak Saqib, Haider Sajjad, Reddy G. Thippa, Jolfaei Alireza, and Alazab Mamoun. 2020. A systematic review on clone node detection in static wireless sensor networks. IEEE Access 8 (2020), 6545065461.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Redmon Joseph, Divvala Santosh, Girshick Ross, and Farhadi Ali. 2016. You only look once: Unified, real-time object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 779788.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Roman Rodrigo, Lopez Javier, and Mambo Masahiro. 2018. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems 78 (2018), 680698.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Shah Syed Bilal, Zhe Chen, Yin Fuliang, Khan Inam Ullah, Begum Seema, Faheem Muhammad, and Khan Fakhri Alam. 2018. 3D weighted centroid algorithm & RSSI ranging model strategy for node localization in WSN based on smart devices. Sustainable Cities & Society 39 (2018), 298308.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Shah Syed Bilal Hussain, Chen Zhe, Yin Fuliang, Khan Inam Ullah, and Ahmad Niqash. 2018. Energy and interoperable aware routing for throughput optimization in clustered IoT-wireless sensor networks. Future Generation Computer Systems 81 (2018), 372381.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Shen Jie, Varbanescu Ana Lucia, Lu Yutong, Zou Peng, and Sips Henk. 2015. Workload partitioning for accelerating applications on heterogeneous platforms. IEEE Transactions on Parallel and Distributed Systems 27, 9 (2015), 27662780.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Shirazi Syed Noorulhassan, Gouglidis Antonios, Farshad Arsham, and Hutchison David. 2017. The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE Journal on Selected Areas in Communications 35, 11 (2017), 25862595.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Swarna Priya R. M., Bhattacharya Sweta, Maddikunta Praveen Kumar Reddy, Somayaji Siva Rama Krishnan, and Gadekallu Thippa Reddy. 2020. Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything. Journal of Parallel & Distributed Computing (2020), 32–41.Google ScholarGoogle Scholar
  33. [33] Thippa Reddy G., Bhattacharya Sweta, Maddikunta Praveen Kumar Reddy, Hakak Saqib, and Tariq Usman. 2020. Antlion re-sampling based deep neural network model for classification of imbalanced multimodal stroke dataset. Multimedia Tools and Applications (2020), 125.Google ScholarGoogle Scholar
  34. [34] Wu C., Wang X., Chen M., and Mi J. K.. 2019. Differential received signal strength based RFID positioning for construction equipment tracking. Advanced Engineering Informatics 42 (2019), 100960.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Xf A., Gf B., Pp B., Ga B., and Wl C.. 2020. Environment-fusion multipath routing protocol for wireless sensor networks. Information Fusion 53 (2020), 419.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Xue Q., Zhu Y., and Wang J.. 2019. Joint distribution estimation and naive Bayes classification under local differential privacy. IEEE Transactions on Emerging Topics in Computing (2019), 11. Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Yin Zhengyu, Korzhyk Dmytro, Kiekintveld Christopher, Conitzer Vincent, and Tambe Milind. 2010. Stackelberg vs. Nash in security games: Interchangeability, equivalence, and uniqueness. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: Volume 1. International Foundation for Autonomous Agents and Multiagent Systems, 11391146.Google ScholarGoogle Scholar
  38. [38] Zhu Q.. 2020. Research on road traffic situation awareness system based on image big data. IEEE Intelligent Systems 35, 1 (2020), 1826. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Enhancing Security-Problem-Based Deep Learning in Mobile Edge Computing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 22, Issue 2
      May 2022
      582 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3490674
      • Editor:
      • Ling Liu
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 May 2022
      • Accepted: 1 March 2021
      • Revised: 1 November 2020
      • Received: 1 September 2020
      Published in toit Volume 22, Issue 2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Refereed
    • Article Metrics

      • Downloads (Last 12 months)191
      • Downloads (Last 6 weeks)4

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!