Affiliation:
1. Institute of Radiocommunications, Poznan University of Technology, 61-131 Poznan, Poland
Abstract
Machine learning-based classification algorithms allow communication and computing (2C) task offloading from the end devices to the edge computing network servers. In this paper, we consider task classification based on the hybrid k-means and k′-nearest neighbors algorithms. Moreover, we examine the poisoning attacks on such ML algorithms, namely noise-like jamming and targeted data feature falsification, and their impact on the effectiveness of 2C task allocation. Then, we also present two anomaly detection methods using noise training and the silhouette score test to detect the poisoned samples and mitigate their impact. Our simulation results show that these attacks have a fatal effect on classification in feature areas where the decision boundary is unclear. They also demonstrate the effectiveness of our countermeasures against the considered attacks.
Funder
Polish Ministry of Education and Science
Reference47 articles.
1. (2023, November 07). The Ericsson Mobility Report. Available online: https://www.ericsson.com/49dd9d/assets/local/reports-papers/mobility-report/documents/2023/ericsson-mobility-report-june-2023.pdf.
2. Huang, L., Joseph, A., Nelson, B., Rubinstein, B., and Tygar, J. (2011, January 21). Adversarial machine learning. Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, Chicago, IL, USA.
3. Task scheduling mechanisms in fog computing: Review, trends, and perspectives;Yang;Kybernetes,2020
4. A review on computational intelligence techniques in cloud and edge computing;Asim;IEEE Trans. Emerg. Top. Comput. Intell.,2020
5. Resource scheduling in edge computing: A survey;Luo;IEEE Commun. Surv. Tutor.,2021