DeepAI AI Chat
Log In Sign Up

Secure Mobile Edge Computing in IoT via Collaborative Online Learning

by   Bingcong Li, et al.
University of Minnesota

To accommodate heterogeneous tasks in Internet of Things (IoT), a new communication and computing paradigm termed mobile edge computing emerges that extends computing services from the cloud to edge, but at the same time exposes new challenges on security. The present paper studies online security-aware edge computing under jamming attacks. Leveraging online learning tools, novel algorithms abbreviated as SAVE-S and SAVE-A are developed to cope with the stochastic and adversarial forms of jamming, respectively. Without utilizing extra resources such as spectrum and transmission power to evade jamming attacks, SAVE-S and SAVE-A can select the most reliable server to offload computing tasks with minimal privacy and security concerns. It is analytically established that without any prior information on future jamming and server security risks, the proposed schemes can achieve O(√(T)) regret. Information sharing among devices can accelerate the security-aware computing tasks. Incorporating the information shared by other devices, SAVE-S and SAVE-A offer impressive improvements on the sublinear regret, which is guaranteed by what is termed "value of cooperation." Effectiveness of the proposed schemes is tested on both synthetic and real datasets.


STEC-IoT: A Security Tactic by Virtualizing Edge Computing on IoT

To a large extent, the deployment of edge computing (EC) can reduce the ...

Towards Edge-assisted Internet of Things: From Security and Efficiency Perspectives

As we are moving towards the Internet of Things (IoT) era, the number of...

An SLR on Edge Computing Security and possible threat protection

Mobile and Internet of Things devices are generating enormous amounts of...

Distributed Online Learning with Multiple Kernels

In the Internet-of-Things (IoT) systems, there are plenty of informative...

SAFEMYRIDES: Application of Decentralized Control Edge-Computing to Ridesharing Monitoring Services

Edge computing is changing the face of many industries and services. Com...

Authentication Devices in Fog-Mobile Edge Computing Environments Through a Wireless Grid Resource Sharing Protocol

The rapid growth of the Internet of Things (IoT), cloud computing, Fog c...

A Novel Sybil Attack Detection Scheme Based on Edge Computing for Mobile IoT Environment

Internet of things (IoT) connects all items to the Internet through info...