Affiliation:
1. China Industrial Control Systems Cyber Emergency Response Team, Beijing, China
Abstract
Edge computing extends the cloud computing paradigm to the edge of the network to offset the shortcomings of traditional cloud computing in mobile support, low delay, and location awareness. However, traditional complicated encryption algorithms, access control measures, identification protocols, and privacy protection methods are inapplicable to security defense of edge computing given the multisource data fusion characteristics of edge computing, superposition of mobile and the Internet, and resource limitations in storage, computing, and battery capacity of edge terminals. Therefore, a reasonable defense model for complicated dynamic edge computing environment must be established. In accordance with the characteristics of limited resources of edge devices, combined with dynamic game theory, this study proposes an optimal defense strategy model based on a differential game and solves the optimal defense strategy of edge nodes in infinite and finite-horizons. The optimal defense strategy of the edge nodes was simulated under different conditions, and the simulation verifies that the edge nodes can obtain the optimal defense effect with minimum resource consumption when cooperating to form the defense system.
Subject
Artificial Intelligence,General Engineering,Statistics and Probability
Reference14 articles.
1. Finding your way in the fog: Towards a comprehensive definition of fog computing[J];Vaquero;ACM SIGCOMM Computer Communication Review,2014
2. Edge-centric computing: Vision and challenges[J];Garcia Lopez;ACM SIGCOMM Computer Communication Review,2015
3. Satyanarayanan M. , Bahl P. , Caceres R. , et al., The case for vm-based cloudlets in mobile computing[J], IEEE Pervasive Computing 8(4), 2009.
4. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges[J];Roman;Future Generation Computer Systems,2018
5. A survey on mobile edge computing: The communication perspective[J];Mao;IEEE Communications Surveys & Tutorials,2017
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献