Security in Mobile Edge Caching with Reinforcement Learning
Top Cited Papers
- 4 July 2018
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Wireless Communications
- Vol. 25 (3), 116-122
- https://doi.org/10.1109/mwc.2018.1700291
Abstract
Mobile edge computing usually uses caching to support multimedia contents in 5G mobile Internet to reduce the computing overhead and latency. Mobile edge caching (MEC) systems are vulnerable to various attacks such as denial of service attacks and rogue edge attacks. This article investigates the attack models in MEC systems, focusing on both the mobile offloading and the caching procedures. In this article, we propose security solutions that apply reinforcement learning (RL) techniques to provide secure offloading to the edge nodes against jamming attacks. We also present lightweight authentication and secure collaborative caching schemes to protect data privacy. We evaluate the performance of the RL-based security solution for mobile edge caching and discuss the challenges that need to be addressed in the future.Keywords
This publication has 16 references indexed in Scilit:
- Mobile edge computing, Fog et al.: A survey and analysis of security threats and challengesFuture Generation Computer Systems, 2018
- Cloud-Based Malware Detection Game for Mobile Devices with OffloadingIEEE Transactions on Mobile Computing, 2017
- Multi-Agent Reinforcement Learning Based Cognitive Anti-JammingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- Machine Learning Paradigms for Next-Generation Wireless NetworksIEEE Wireless Communications, 2016
- A Mobile Offloading Game Against Smart AttacksIEEE Access, 2016
- PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless NetworksIEEE Transactions on Vehicular Technology, 2016
- Improving learning and adaptation in security games by exploiting information asymmetryPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learningPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- A survey of key management schemes in wireless sensor networksComputer Communications, 2007
- An effective key management scheme for heterogeneous sensor networksAd Hoc Networks, 2007