Abstract
The implementation of a variety of complex and energy-intensive mobile applications by resource-limited mobile devices (MDs) is a huge challenge. Fortunately, mobile edge computing (MEC) as a new computing paragon can offer rich resources to perform all or part of the MD’s task, which greatly reduces the energy consumption of the MD and improves the quality of service (QoS) for applications. However, offloading tasks to the edge server is vulnerable to attacks such as tampering and snooping, resulting in a deep learning (DL) security feature developed by major cloud service providers. An effective security strategy method to minimize ongoing attacks in the MEC setting is proposed. The algorithm is based on the synthetic principle of a special set of strategies, and it can quickly construct suboptimal solutions even if the number of targets achieves hundreds of millions. In addition, for a given structure and a given number of patrollers, the upper bound of the protection level can be obtained, and the lower bound required for a given protection level can also be inferred. These bounds apply to universal strategies. By comparing with the previous three basic experiments, it can be proved that our algorithm is better than the previous ones in terms of security and running time.
- [1] . 2009. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 1. International Foundation for Autonomous Agents and Multiagent Systems, 57–64.Google Scholar
Digital Library
- [2] . 2012. Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder. Artificial Intelligence 184 (2012), 78–123.Google Scholar
Digital Library
- [3] . 2009. Extending algorithms for mobile robot patrolling in the presence of adversaries to more realistic settings. In 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, Vol. 2. IEEE, 557–564.Google Scholar
Digital Library
- [4] . 2010. Asynchronous multi-robot patrolling against intrusions in arbitrary topologies. In 24th AAAI Conference on Artificial Intelligence.Google Scholar
- [5] . 2016. A security game model for remote software protection. In 2016 11th International Conference on Availability, Reliability and Security (ARES’16). IEEE, 437–443.Google Scholar
Cross Ref
- [6] . 2011. Computing time-dependent policies for patrolling games with mobile targets. In The 10th International Conference on Autonomous Agents and Multiagent Systems-Volume 3. International Foundation for Autonomous Agents and Multiagent Systems, 989–996.Google Scholar
Digital Library
- [7] . 2010. Codebender: Remote software protection using orthogonal replacement. IEEE Software 28, 2 (2010), 28–34.Google Scholar
Digital Library
- [8] . 2018. When traffic flow prediction and wireless big data analytics meet. IEEE Network 33, 3 (2018), 161–167.Google Scholar
Cross Ref
- [9] . 2019. Deep learning for secure mobile edge computing in cyber-physical transportation systems. IEEE Network 33, 4 (2019), 36–41.Google Scholar
Cross Ref
- [10] . 2015. Enhancing a City’s Ability to Plan, Protect and Manage with Intelligent Video Analytics.
Technical Report . Technical report, A Frost & Sullivan White Paper.Google Scholar - [11] . 2017. MQRP: Mobile sinks-based QoS-aware data gathering protocol for wireless sensor networks-based smart grid applications in the context of industry 4.0-based on internet of things. Future Generation Computer Systems 82, (May 2017), 358–374.Google Scholar
Cross Ref
- [12] . 2018. Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges. Computer Ence Review 30, Nov (2018), 1–30.Google Scholar
- [13] . 2013. Optimal patrol strategy for protecting moving targets with multiple mobile resources. In Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 957–964.Google Scholar
Digital Library
- [14] . 2020. Modeling and analysis of cascading node-link failures in multi-sink wireless sensor networks - ScienceDirect. Reliability Engineering & System Safety 197 (2020).Google Scholar
Cross Ref
- [15] . 2021. MFQE 2.0: A new approach for multi-frame quality enhancement on compressed video. IEEE Transactions on Pattern Analysis and Machine Intelligence 43, 3 (2021), 949–963. Google Scholar
Cross Ref
- [16] . 2020. KeySplitWatermark: Zero watermarking algorithm for software protection against cyber-attacks. IEEE Access 8 (2020), 72650–72660. Google Scholar
Cross Ref
- [17] . 2010. Optimal defender allocation for massive security games: A branch and price approach. In Workshop 25: Optimisation in Multi-agent Systems. 23.Google Scholar
- [18] . 2018. Energy consumption analysis of Virtual Machine migration in cloud using hybrid swarm optimization (ABC-BA). Journal of Supercomputing (2018), 1–17.Google Scholar
- [19] . 2018. Quasi-regular sequences and optimal schedules for security games. In Proceedings of the 29th Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 1625–1644.Google Scholar
Cross Ref
- [20] . 2009. Computing optimal randomized resource allocations for massive security games. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 1. International Foundation for Autonomous Agents and Multiagent Systems, 689–696.Google Scholar
Digital Library
- [21] . 2019. Highly efficient privacy preserving location-based services with enhanced one-round blind filter. IEEE Transactions on Emerging Topics in Computing PP, 99 (2019), 1–1.Google Scholar
- [22] . 2020. Trustworthiness in industrial IoT systems based on artificial intelligence. IEEE Transactions on Industrial Informatics 17, 2 (2021), 1–1. Google Scholar
Cross Ref
- [23] . 2020. Machine learning assisted information management scheme in service concentrated IoT. IEEE Transactions on Industrial Informatics (2020), 12–24.Google Scholar
- [24] . 2013. Introducing alarms in adversarial patrolling games. In Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 1275–1276.Google Scholar
- [25] . 2020. A systematic review on clone node detection in static wireless sensor networks. IEEE Access 8 (2020), 65450–65461.Google Scholar
Cross Ref
- [26] . 2016. You only look once: Unified, real-time object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 779–788.Google Scholar
Cross Ref
- [27] . 2018. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems 78 (2018), 680–698.Google Scholar
Cross Ref
- [28] . 2018. 3D weighted centroid algorithm & RSSI ranging model strategy for node localization in WSN based on smart devices. Sustainable Cities & Society 39 (2018), 298–308.Google Scholar
Cross Ref
- [29] . 2018. Energy and interoperable aware routing for throughput optimization in clustered IoT-wireless sensor networks. Future Generation Computer Systems 81 (2018), 372–381.Google Scholar
Digital Library
- [30] . 2015. Workload partitioning for accelerating applications on heterogeneous platforms. IEEE Transactions on Parallel and Distributed Systems 27, 9 (2015), 2766–2780.Google Scholar
Digital Library
- [31] . 2017. The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE Journal on Selected Areas in Communications 35, 11 (2017), 2586–2595.Google Scholar
Cross Ref
- [32] . 2020. Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything. Journal of Parallel & Distributed Computing (2020), 32–41.Google Scholar
- [33] . 2020. Antlion re-sampling based deep neural network model for classification of imbalanced multimodal stroke dataset. Multimedia Tools and Applications (2020), 1–25.Google Scholar
- [34] . 2019. Differential received signal strength based RFID positioning for construction equipment tracking. Advanced Engineering Informatics 42 (2019), 100960.Google Scholar
Digital Library
- [35] . 2020. Environment-fusion multipath routing protocol for wireless sensor networks. Information Fusion 53 (2020), 4–19.Google Scholar
Digital Library
- [36] . 2019. Joint distribution estimation and naive Bayes classification under local differential privacy. IEEE Transactions on Emerging Topics in Computing (2019), 1–1. Google Scholar
Cross Ref
- [37] . 2010. Stackelberg vs. Nash in security games: Interchangeability, equivalence, and uniqueness. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: Volume 1. International Foundation for Autonomous Agents and Multiagent Systems, 1139–1146.Google Scholar
- [38] . 2020. Research on road traffic situation awareness system based on image big data. IEEE Intelligent Systems 35, 1 (2020), 18–26. Google Scholar
Digital Library
Index Terms
Enhancing Security-Problem-Based Deep Learning in Mobile Edge Computing
Recommendations
Edge computing: A survey
AbstractIn recent years, the Edge computing paradigm has gained considerable popularity in academic and industrial circles. It serves as a key enabler for many future technologies like 5G, Internet of Things (IoT), augmented reality and ...
Highlights- A comprehensive survey on edge computing, i.e., Fog, Mobile-edge and Cloudlet.
- ...
Modelling Task Offloading Mobile Edge Computing
ICCDE '22: Proceedings of the 2022 8th International Conference on Computing and Data EngineeringWith the rapid growth of mobile devices (such as smart phones and IoT devices) and the upcoming 5G era, it has been considered that edge computing will play a significant role, which together with the Cloud server forms the Mobile Edge Computing (MEC) ...
All one needs to know about fog computing and related edge computing paradigms: A complete survey
AbstractWith the Internet of Things (IoT) becoming part of our daily life and our environment, we expect rapid growth in the number of connected devices. IoT is expected to connect billions of devices and humans to bring promising advantages ...






Comments