Reputation Based Attacker Identification Policy for Multi-Access Edge Computing in Internet of Things

被引:16
|
作者
Sandal, Yagmur Sabucu [1 ]
Pusane, Ali Emre [1 ]
Kurt, Gunes Karabulut [2 ]
Benedetto, Francesco [3 ]
机构
[1] Bogazici Univ, Dept Elect & Elect Engn, TR-34342 Istanbul, Turkey
[2] Istanbul Tech Univ, Dept Elect & Telecommun Engn, TR-34467 Istanbul, Turkey
[3] Univ ROMA TRE, Signal Proc Telecommun & Econ Lab, I-00154 Rome, Italy
关键词
Resource management; Servers; Security; Games; Task analysis; Internet of Things; Performance evaluation; Attacker identification; multi-access edge computing; reputation; stable matching; RESOURCE-ALLOCATION; NETWORKS; STABILITY; SECURITY; USER;
D O I
10.1109/TVT.2020.3040105
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the recent years, there has been an explosive growth of smart devices applications with high computational demands and critical latency. The Internet of Things (IoT) multi-access edge computing (MEC) framework offers a lower latency and a higher speed to the users, by offloading the cloud computing capabilities at the nearest edge of the mobile network. In this operating scenario, the proper allocation of limited resources is one of the biggest challenges, and security is becoming vital as the number of devices in an IoT network tends to billions. According to recent studies, even authorized edge devices may be a significant threat for IoT networks (i.e., selfish behavior), as a result of mixed service structures with a wide range of different requirements. Thus, this work proposes a novel two-fold method to allocate resources and then identify attackers (selfish IoT malicious devices) by means of a reputation-based stable matching policy. The devices are categorized in three different states, namely honest, suspicious, and malicious states, according to their reputation indices. Our algorithm allows to move the devices between the three states, in order to exclude malicious devices and to rehabilitate users identified as unintentional attackers (due to bad propagation conditions). Theoretical and simulation results confirm the validity and effectiveness of such approach for identifying malicious IoT devices in MEC networks.
引用
收藏
页码:15346 / 15356
页数:11
相关论文
共 50 条
  • [1] Survey on Multi-Access Edge Computing for Internet of Things Realization
    Porambage, Pawani
    Okwuibe, Jude
    Liyanage, Madhusanka
    Ylianttila, Mika
    Taleb, Tarik
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 2961 - 2991
  • [2] Trust Assessment for Internet of Things in Multi-access Edge Computing
    Ruan, Yefeng
    Durresi, Arjan
    Uslu, Suleyman
    [J]. PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 1155 - 1161
  • [3] Multi-access edge computing enabled internet of things: advances and novel applications
    Zhu, Rongbo
    Liu, Lu
    Song, Houbing
    Ma, Maode
    [J]. NEURAL COMPUTING & APPLICATIONS, 2020, 32 (19): : 15313 - 15316
  • [4] Multi-access edge computing aided mobility for privacy protection in Internet of Things
    Ping Zhang
    Mimoza Durresi
    Arjan Durresi
    [J]. Computing, 2019, 101 : 729 - 742
  • [5] Multi-access edge computing aided mobility for privacy protection in Internet of Things
    Zhang, Ping
    Durresi, Mimoza
    Durresi, Arjan
    [J]. COMPUTING, 2019, 101 (07) : 729 - 742
  • [6] Multi-access edge computing enabled internet of things: advances and novel applications
    Rongbo Zhu
    Lu Liu
    Houbing Song
    Maode Ma
    [J]. Neural Computing and Applications, 2020, 32 : 15313 - 15316
  • [7] A comprehensive review on internet of things task offloading in multi-access edge computing
    Dayong, Wang
    Abu Bakar, Kamalrulnizam Bin
    Isyaku, Babangida
    Eisa, Taiseer Abdalla Elfadil
    Abdelmaboud, Abdelzahir
    [J]. HELIYON, 2024, 10 (09)
  • [8] Balanced multi-access edge computing offloading strategy in the Internet of things scenario
    Ye, Dan
    Wang, Xiaogang
    Hou, Jin
    [J]. COMPUTER COMMUNICATIONS, 2022, 194 : 399 - 410
  • [9] Experiences from Building a Multi-Access Edge Computing Internet of Things Testbed
    Mavromatis, Alex
    Simeonidou, Dimitra
    [J]. 2020 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC 2020), 2020, : 259 - 264
  • [10] Fuzzy-based Misbehavior Detection for Internet of Things in Multi-access Edge Computing Environment
    Mansour, Marvy Badr Monir
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (08)