• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Tu, Shanshan (Tu, Shanshan.) | Waqas, Muhammad (Waqas, Muhammad.) | Rehman, Sadaqat Ur (Rehman, Sadaqat Ur.) | Aamir, Muhammad (Aamir, Muhammad.) | Rehman, Obaid Ur (Rehman, Obaid Ur.) | Zhang, Jianbiao (Zhang, Jianbiao.) (学者:张建标) | Chang, Chin-Chen (Chang, Chin-Chen.)

收录:

EI Scopus SCIE

摘要:

Fog computing is an encouraging technology in the coming generation to pipeline the breach between cloud data centers and Internet of Things (IoT) devices. Fog computing is not a counterfeit for cloud computing but a persuasive counterpart. It also accredits by utilizing the edge of the network while still rendering the possibility to interact with the cloud. Nevertheless, the features of fog computing are encountering novel security challenges. The security of end users and/or fog nodes brings a major dilemma in the implementation of real life scenario. Although there are several works investigated in the security challenges, physical layer security (PLS) in fog computing is not investigated in the above. The distinctive and evolving IoT applications necessitate new security regulations, models, and evaluations disseminated at the network edge. Notwithstanding, the achievement of the current cryptographic solutions in the customary way, many aspects, i.e., system imperfections, hacking skills, and augmented attack, has upheld the inexorableness of the detection techniques. Hence, we investigate PLS that exploits the properties of channel between end user and fog node to detect the impersonation attack in fog computing network. Moreover, it is also challenging to achieve the accurate channel constraints between end user and fog node. Therefore, we propose Q-learning algorithm to attain the optimum value of test threshold in the impersonation attack. The performance of the propose scheme validates and guarantees to detect the impersonation attack accurately in fog computing networks.

关键词:

physical layer security Fog computing reinforcement learning impersonation attack

作者机构:

  • [ 1 ] [Tu, Shanshan]Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
  • [ 2 ] [Zhang, Jianbiao]Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
  • [ 3 ] [Tu, Shanshan]Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
  • [ 4 ] [Waqas, Muhammad]Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
  • [ 5 ] [Rehman, Sadaqat Ur]Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
  • [ 6 ] [Aamir, Muhammad]Edith Cowan Univ, Sch Engn, Joondalup, WA 6027, Australia
  • [ 7 ] [Rehman, Obaid Ur]Sarhad Univ Sci & Informat Technol, Dept Elect Engn, Peshawar 25000, Pakistan
  • [ 8 ] [Chang, Chin-Chen]Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan

通讯作者信息:

  • [Waqas, Muhammad]Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China

电子邮件地址:

查看成果更多字段

相关关键词:

来源 :

IEEE ACCESS

ISSN: 2169-3536

年份: 2018

卷: 6

页码: 74993-75001

3 . 9 0 0

JCR@2022

JCR分区:1

被引次数:

WoS核心集被引频次: 62

SCOPUS被引频次: 78

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 2

归属院系:

在线人数/总访问数:755/3898720
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司