An Efficient Impersonation Attack Detection Method in Fog Computing

被引:11
|
作者
Wan, Jialin [1 ]
Waqas, Muhammad [1 ,2 ]
Tu, Shanshan [1 ]
Hussain, Syed Mudassir [3 ]
Shah, Ahsan [2 ]
Rehman, Sadaqat Ur [4 ]
Hanif, Muhammad [2 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China
[2] Ghulam Ishaq Khan Inst Engn Sci & Technol, Fac Comp Sci & Engn, Topi 23460, Pakistan
[3] Balochistan Univ Informat Technol Engn & Manageme, Dept Elect Engn, FICT, Quetta 87300, Pakistan
[4] Namal Inst, Dept Comp Sci, Mianwali 42200, Pakistan
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 68卷 / 01期
关键词
Fog computing; double Sarsa; attack detection; physical layer key security; SECRET KEY GENERATION; PHYSICAL-LAYER SECURITY; 5G WIRELESS NETWORKS; IOT; INFORMATION; INTERNET;
D O I
10.32604/cmc.2021.016260
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing paradigm extends computing, communication, storage, and network resources to the network's edge. As the fog layer is located between cloud and end-users, it can provide more convenience and timely services to end-users. However, in fog computing (FC), attackers can behave as real fog nodes or end-users to provide malicious services in the network. The attacker acts as an impersonator to impersonate other legitimate users. Therefore, in this work, we present a detection technique to secure the FC environment. First, we model a physical layer key generation based on wireless channel characteristics. To generate the secret keys between the legitimate users and avoid impersonators, we then consider a Double Sarsa technique to identify the impersonators at the receiver end. We compare our proposed Double Sarsa technique with the other two methods to validate our work, i.e., Sarsa and Q-learning. The simulation results demonstrate that the method based on Double Sarsa outperforms Sarsa and Q-learning approaches in terms of false alarm rate (FAR), miss detection rate (MDR), and average error rate (AER).
引用
收藏
页码:267 / 281
页数:15
相关论文
共 50 条
  • [1] Novel Homomorphic Encryption for Mitigating Impersonation Attack in Fog Computing
    Balaji, V.
    Selvaraj, P.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (02): : 2015 - 2027
  • [2] Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack
    Tu, Shanshan
    Waqas, Muhammad
    Rehman, Sadaqat Ur
    Aamir, Muhammad
    Rehman, Obaid Ur
    Zhang, Jianbiao
    Chang, Chin-Chen
    [J]. IEEE ACCESS, 2018, 6 : 74993 - 75001
  • [3] Impersonation Attack Detection in IoT Networks
    Dinh Duc Nha Nguyen
    Sood, Keshav
    Xiang, Yong
    Gao, Longxiang
    Chi, Lianhua
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6061 - 6066
  • [4] A Hierarchical Fog Computing Framework for Network Attack Detection in SDN
    Houda, Zakaria Abou El
    Khoukhi, Lyes
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 4366 - 4371
  • [5] A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing
    Aliyu, Farouq
    Sheltami, Tarek
    Shakshuki, Elhadi M.
    [J]. 9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018), 2018, 141 : 24 - 31
  • [6] IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction
    Lee, Seo Jin
    Yoo, Paul D.
    Asyhari, A. Taufiq
    Jhi, Yoonchan
    Chermak, Lounis
    Yeun, Chan Yeob
    Taha, Kamal
    [J]. IEEE ACCESS, 2020, 8 : 65520 - 65529
  • [7] Impersonation Attack Detection in Mobile Edge Computing by Levering SARSA Technique in Physical Layer Security
    Yan, Xiaodan
    Yan, Ke
    Rehman, Meezan Ur
    Ullah, Sami
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (20):
  • [8] Enhancing Security in VANETs with Sybil Attack Detection using Fog Computing
    Paranjothi, Anirudh
    Khan, Mohammad S.
    [J]. 2023 IEEE 98TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-FALL, 2023,
  • [9] Efficient caching method in fog computing for internet of everything
    Riya
    Gupta, Nitin
    Dhurandher, Sanjay Kumar
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 439 - 452
  • [10] Efficient caching method in fog computing for internet of everything
    Nitin Riya
    Sanjay Kumar Gupta
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 439 - 452