• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Tu, Shanshan (Tu, Shanshan.) | Waqas, Muhammad (Waqas, Muhammad.) | Rehman, Sadaqat Ur (Rehman, Sadaqat Ur.) | Aamir, Muhammad (Aamir, Muhammad.) | Rehman, Obaid Ur (Rehman, Obaid Ur.) | Zhang, Jianbiao (Zhang, Jianbiao.) (Scholars:张建标) | Chang, Chin-Chen (Chang, Chin-Chen.)

Indexed by:

EI Scopus SCIE

Abstract:

Fog computing is an encouraging technology in the coming generation to pipeline the breach between cloud data centers and Internet of Things (IoT) devices. Fog computing is not a counterfeit for cloud computing but a persuasive counterpart. It also accredits by utilizing the edge of the network while still rendering the possibility to interact with the cloud. Nevertheless, the features of fog computing are encountering novel security challenges. The security of end users and/or fog nodes brings a major dilemma in the implementation of real life scenario. Although there are several works investigated in the security challenges, physical layer security (PLS) in fog computing is not investigated in the above. The distinctive and evolving IoT applications necessitate new security regulations, models, and evaluations disseminated at the network edge. Notwithstanding, the achievement of the current cryptographic solutions in the customary way, many aspects, i.e., system imperfections, hacking skills, and augmented attack, has upheld the inexorableness of the detection techniques. Hence, we investigate PLS that exploits the properties of channel between end user and fog node to detect the impersonation attack in fog computing network. Moreover, it is also challenging to achieve the accurate channel constraints between end user and fog node. Therefore, we propose Q-learning algorithm to attain the optimum value of test threshold in the impersonation attack. The performance of the propose scheme validates and guarantees to detect the impersonation attack accurately in fog computing networks.

Keyword:

physical layer security Fog computing reinforcement learning impersonation attack

Author Community:

  • [ 1 ] [Tu, Shanshan]Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
  • [ 2 ] [Zhang, Jianbiao]Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
  • [ 3 ] [Tu, Shanshan]Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
  • [ 4 ] [Waqas, Muhammad]Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
  • [ 5 ] [Rehman, Sadaqat Ur]Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
  • [ 6 ] [Aamir, Muhammad]Edith Cowan Univ, Sch Engn, Joondalup, WA 6027, Australia
  • [ 7 ] [Rehman, Obaid Ur]Sarhad Univ Sci & Informat Technol, Dept Elect Engn, Peshawar 25000, Pakistan
  • [ 8 ] [Chang, Chin-Chen]Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan

Reprint Author's Address:

  • [Waqas, Muhammad]Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China

Show more details

Related Keywords:

Source :

IEEE ACCESS

ISSN: 2169-3536

Year: 2018

Volume: 6

Page: 74993-75001

3 . 9 0 0

JCR@2022

JCR Journal Grade:1

Cited Count:

WoS CC Cited Count: 66

SCOPUS Cited Count: 84

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 2

Online/Total:647/10710034
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.