An Efficient Impersonation Attack Detection Method in Fog Computing

被引:12
|
作者
Wan, Jialin [1 ]
Waqas, Muhammad [1 ,2 ]
Tu, Shanshan [1 ]
Hussain, Syed Mudassir [3 ]
Shah, Ahsan [2 ]
Rehman, Sadaqat Ur [4 ]
Hanif, Muhammad [2 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Engn Res Ctr Intelligent Percept & Autonomous Con, Beijing 100124, Peoples R China
[2] Ghulam Ishaq Khan Inst Engn Sci & Technol, Fac Comp Sci & Engn, Topi 23460, Pakistan
[3] Balochistan Univ Informat Technol Engn & Manageme, Dept Elect Engn, FICT, Quetta 87300, Pakistan
[4] Namal Inst, Dept Comp Sci, Mianwali 42200, Pakistan
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 68卷 / 01期
关键词
Fog computing; double Sarsa; attack detection; physical layer key security; SECRET KEY GENERATION; PHYSICAL-LAYER SECURITY; 5G WIRELESS NETWORKS; IOT; INFORMATION; INTERNET;
D O I
10.32604/cmc.2021.016260
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing paradigm extends computing, communication, storage, and network resources to the network's edge. As the fog layer is located between cloud and end-users, it can provide more convenience and timely services to end-users. However, in fog computing (FC), attackers can behave as real fog nodes or end-users to provide malicious services in the network. The attacker acts as an impersonator to impersonate other legitimate users. Therefore, in this work, we present a detection technique to secure the FC environment. First, we model a physical layer key generation based on wireless channel characteristics. To generate the secret keys between the legitimate users and avoid impersonators, we then consider a Double Sarsa technique to identify the impersonators at the receiver end. We compare our proposed Double Sarsa technique with the other two methods to validate our work, i.e., Sarsa and Q-learning. The simulation results demonstrate that the method based on Double Sarsa outperforms Sarsa and Q-learning approaches in terms of false alarm rate (FAR), miss detection rate (MDR), and average error rate (AER).
引用
收藏
页码:267 / 281
页数:15
相关论文
共 50 条
  • [1] Novel Homomorphic Encryption for Mitigating Impersonation Attack in Fog Computing
    Balaji, V.
    Selvaraj, P.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (02): : 2015 - 2027
  • [2] Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack
    Tu, Shanshan
    Waqas, Muhammad
    Rehman, Sadaqat Ur
    Aamir, Muhammad
    Rehman, Obaid Ur
    Zhang, Jianbiao
    Chang, Chin-Chen
    IEEE ACCESS, 2018, 6 : 74993 - 75001
  • [3] Impersonation Attack Detection in IoT Networks
    Dinh Duc Nha Nguyen
    Sood, Keshav
    Xiang, Yong
    Gao, Longxiang
    Chi, Lianhua
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6061 - 6066
  • [4] A Hierarchical Fog Computing Framework for Network Attack Detection in SDN
    Houda, Zakaria Abou El
    Khoukhi, Lyes
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 4366 - 4371
  • [5] A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing
    Aliyu, Farouq
    Sheltami, Tarek
    Shakshuki, Elhadi M.
    9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018), 2018, 141 : 24 - 31
  • [6] IMPACT: Impersonation Attack Detection via Edge Computing Using Deep Autoencoder and Feature Abstraction
    Lee, Seo Jin
    Yoo, Paul D.
    Asyhari, A. Taufiq
    Jhi, Yoonchan
    Chermak, Lounis
    Yeun, Chan Yeob
    Taha, Kamal
    IEEE ACCESS, 2020, 8 : 65520 - 65529
  • [7] Impersonation Attack Detection in Mobile Edge Computing by Levering SARSA Technique in Physical Layer Security
    Yan, Xiaodan
    Yan, Ke
    Rehman, Meezan Ur
    Ullah, Sami
    APPLIED SCIENCES-BASEL, 2022, 12 (20):
  • [8] Enhancing Security in VANETs with Sybil Attack Detection using Fog Computing
    Paranjothi, Anirudh
    Khan, Mohammad S.
    2023 IEEE 98TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-FALL, 2023,
  • [9] Efficient caching method in fog computing for internet of everything
    Riya
    Gupta, Nitin
    Dhurandher, Sanjay Kumar
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 439 - 452
  • [10] Efficient caching method in fog computing for internet of everything
    Nitin Riya
    Sanjay Kumar Gupta
    Peer-to-Peer Networking and Applications, 2021, 14 : 439 - 452