skip to main content
research-article

Enhancing Security-Problem-Based Deep Learning in Mobile Edge Computing

Published: 14 May 2022 Publication History

Abstract

The implementation of a variety of complex and energy-intensive mobile applications by resource-limited mobile devices (MDs) is a huge challenge. Fortunately, mobile edge computing (MEC) as a new computing paragon can offer rich resources to perform all or part of the MD’s task, which greatly reduces the energy consumption of the MD and improves the quality of service (QoS) for applications. However, offloading tasks to the edge server is vulnerable to attacks such as tampering and snooping, resulting in a deep learning (DL) security feature developed by major cloud service providers. An effective security strategy method to minimize ongoing attacks in the MEC setting is proposed. The algorithm is based on the synthetic principle of a special set of strategies, and it can quickly construct suboptimal solutions even if the number of targets achieves hundreds of millions. In addition, for a given structure and a given number of patrollers, the upper bound of the protection level can be obtained, and the lower bound required for a given protection level can also be inferred. These bounds apply to universal strategies. By comparing with the previous three basic experiments, it can be proved that our algorithm is better than the previous ones in terms of security and running time.

Appendix

Proof.
This proof is based on a comprehensive investigation of the even coverage of all targets, where the K-patrollers reflect the importance of each target. From an intuitive perspective, \(T_v\) represents the expected number of visits to v in the subsequent \(t(v)\) step. We fixed a game structure \(\Gamma\) and some patrollers \(k\in N\). Assuming that the existence of \(\eta\) follows standard parameters, then \(\eta\) is the optimal strategy for k patrollers. That is, \(Q=\prod _{v\in V} t(v), \forall 1\le i\le Q\). Assume that \(p_i(v)\) is the probability that v will occur when accessing the ith subset when the defender commits \(\eta\). For each \(1\le i \le Q\), there is \(\sum _{v\in V}P_i(v)=k\) because k patrollers are allocated in each round. Therefore, the sum of all \(P_i(v)\) is equal to \(Q\cdot k\).
\(v\in V, 0\le j\lt Q\), in which j is a multiple of \(t(v)\). Assume \(\zeta\) is the attacker’s strategy such that \(\zeta _{v,j}(w)=v\) for every history w of length j. The general calculation formula is as follows:
\begin{equation} Lev(\eta , \zeta _{v,j})=\alpha (max)-\alpha (v)\cdot \prod _{i=1}^{t(v)}(1-p\cdot P_{(i+j)}). \end{equation}
(5)
Let \(T_{v,j}=\sum _{i=1}^{t(v)}P_{i+j}(v)\). Through the analysis of Equation (5), we can see that \(Lev(\eta , \zeta _{v,j})\) is maximized if the values \(P_{i+j}(v)\) satisfy:
\(P_{i+j}(v)=1,\forall i=\left\lbrace 1,\ldots ,\lfloor T_{v,j} \rfloor \right\rbrace\),
\(P_{i+j}(v)=T_{v,j}-\lfloor T_{v,j} \rfloor , \exists i=\lfloor T_{v,j} \rfloor +1\), and
\(P_{i+j}(v)=0, \forall i\gt \lfloor T_{v,j} \rfloor +1\).
The right half of Equation (5) is rewritten as \(\alpha _(max)-\alpha (v)\cdot (1-p)^{\lfloor T_{v,j} \rfloor }\cdot (1-p\cdot (T_{v,j}-\lfloor T_{v,j} \rfloor))\). In the best case, for a given \(v\in V\), when all \(P_i(v)\) are optimally distributed by \(\eta\), all \(T_{v,j}\) are the same, and the same level of protection\(\eta\) is obtained for each vertex(target), so we use \(T_v\) instead of \(T_{v,j}\) to get the system \(\mathcal {L}_{\Gamma }\).
For all \(P_i(v)\)s the sum is equal to \(Q\cdot k\). By reordering these addends, you can rewrite the sum to \(\sum _{v\in V}\frac{Q}{t(v)}\cdot T_v\). So we can obtain \(k=\sum _{v\in V}\frac{T_{v}}{t(v)}\). If \(p=1\), observe that \(0\le T_{v}\le t(v)\), and we have \(0\le T_{v}\le 1\) because there are no meanings to access the same vertex multiple times.
Note here that when considering the system in solving Theorem 1, it may happen that some \(T_v\) becomes negative. If and only if the importance of certain vertices is so low that even if the discriminators do not access them at all, they are better protected than the other vertices (this explains why the sum \(\sum _{v\in V, T(v)\gt 0}\frac{T_v}{t(v)}\) is taken only from positive \(T(v)\)). The system of Theorem 1(b) may not have a reasonable solution when p is small, and the probability of each v being accessed in each step is 1, the protection \(\rho\) cannot be realized. If \(p=1\), there is no suitable solution caused by \(\rho \gt \alpha _{max}\) only.□

References

[1]
Nicola Basilico, Nicola Gatti, and Francesco Amigoni. 2009. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 1. International Foundation for Autonomous Agents and Multiagent Systems, 57–64.
[2]
Nicola Basilico, Nicola Gatti, and Francesco Amigoni. 2012. Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder. Artificial Intelligence 184 (2012), 78–123.
[3]
Nicola Basilico, Nicola Gatti, Thomas Rossi, Sofia Ceppi, and Francesco Amigoni. 2009. Extending algorithms for mobile robot patrolling in the presence of adversaries to more realistic settings. In 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, Vol. 2. IEEE, 557–564.
[4]
Nicola Basilico, Nicola Gatti, and Federico Villa. 2010. Asynchronous multi-robot patrolling against intrusions in arbitrary topologies. In 24th AAAI Conference on Artificial Intelligence.
[5]
Nicola Basilico, Andrea Lanzi, and Mattia Monga. 2016. A security game model for remote software protection. In 2016 11th International Conference on Availability, Reliability and Security (ARES’16). IEEE, 437–443.
[6]
Branislav Bošanskỳ, Viliam Lisỳ, Michal Jakob, and Michal Pěchouček. 2011. Computing time-dependent policies for patrolling games with mobile targets. In The 10th International Conference on Autonomous Agents and Multiagent Systems-Volume 3. International Foundation for Autonomous Agents and Multiagent Systems, 989–996.
[7]
Mariano Ceccato and Paolo Tonella. 2010. Codebender: Remote software protection using orthogonal replacement. IEEE Software 28, 2 (2010), 28–34.
[8]
Yuanfang Chen, Mohsen Guizani, Yan Zhang, Lei Wang, Noel Crespi, Gyu Myoung Lee, and Ting Wu. 2018. When traffic flow prediction and wireless big data analytics meet. IEEE Network 33, 3 (2018), 161–167.
[9]
Yuanfang Chen, Yan Zhang, Sabita Maharjan, Muhammad Alam, and Ting Wu. 2019. Deep learning for secure mobile edge computing in cyber-physical transportation systems. IEEE Network 33, 4 (2019), 36–41.
[10]
Brian Cotton. 2015. Enhancing a City’s Ability to Plan, Protect and Manage with Intelligent Video Analytics. Technical Report. Technical report, A Frost & Sullivan White Paper.
[11]
Muhammad Faheem and V. C. Gungor. 2017. MQRP: Mobile sinks-based QoS-aware data gathering protocol for wireless sensor networks-based smart grid applications in the context of industry 4.0-based on internet of things. Future Generation Computer Systems 82, (May 2017), 358–374.
[12]
M. Faheem, S. B. H. Shah, R. A. Butt, B. Raza, M. Anwar, M. W. Ashraf, Md. A. Ngadi, and V. C. Gungor. 2018. Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges. Computer Ence Review 30, Nov (2018), 1–30.
[13]
Fei Fang, Albert Xin Jiang, and Milind Tambe. 2013. Optimal patrol strategy for protecting moving targets with multiple mobile resources. In Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 957–964.
[14]
X. Fu and Y. Yang. 2020. Modeling and analysis of cascading node-link failures in multi-sink wireless sensor networks - ScienceDirect. Reliability Engineering & System Safety 197 (2020).
[15]
Z. Guan, Q. Xing, M. Xu, R. Yang, T. Liu, and Z. Wang. 2021. MFQE 2.0: A new approach for multi-frame quality enhancement on compressed video. IEEE Transactions on Pattern Analysis and Machine Intelligence 43, 3 (2021), 949–963.
[16]
Celestine Iwendi, Gautam Srivastava, J. O. Ohyun, and Abdul Rehman Javed. 2020. KeySplitWatermark: Zero watermarking algorithm for software protection against cyber-attacks. IEEE Access 8 (2020), 72650–72660.
[17]
Manish Jain, Erim Kardes, Christopher Kiekintveld, Fernando Ordóñez, and Milind Tambe. 2010. Optimal defender allocation for massive security games: A branch and price approach. In Workshop 25: Optimisation in Multi-agent Systems. 23.
[18]
K. Karthikeyan, R. Sunder, K. Shankar, S. K. Lakshmanaprabu, V. Vijayakumar, Elhoseny Mohamed, and Manogaran Gunasekaran. 2018. Energy consumption analysis of Virtual Machine migration in cloud using hybrid swarm optimization (ABC-BA). Journal of Supercomputing (2018), 1–17.
[19]
David Kempe, Leonard J. Schulman, and Omer Tamuz. 2018. Quasi-regular sequences and optimal schedules for security games. In Proceedings of the 29th Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 1625–1644.
[20]
Christopher Kiekintveld, Manish Jain, Jason Tsai, James Pita, Fernando Ordóñez, and Milind Tambe. 2009. Computing optimal randomized resource allocations for massive security games. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 1. International Foundation for Autonomous Agents and Multiagent Systems, 689–696.
[21]
X. Li, Y. Zhu, and J. Wang. 2019. Highly efficient privacy preserving location-based services with enhanced one-round blind filter. IEEE Transactions on Emerging Topics in Computing PP, 99 (2019), 1–1.
[22]
Zhihan Lv, Yang Han, Amit Kumar Singh, Gunasekaran Manogaran, and Haibin Lv. 2020. Trustworthiness in industrial IoT systems based on artificial intelligence. IEEE Transactions on Industrial Informatics 17, 2 (2021), 1–1.
[23]
Gunasekaran Manogaran, Mamoun Alazab, Vijayalakshmi Saravanan, Bharat S. Rawal, Mohamed Shakeel P., Revathi Sundarasekar, Senthil Murugan Nagarajan, Seifedine Kadry, and Carlos Enrique Montenegro-Marin. 2020. Machine learning assisted information management scheme in service concentrated IoT. IEEE Transactions on Industrial Informatics (2020), 12–24.
[24]
Enrique Munoz de Cote, Ruben Stranders, Nicola Basilico, Nicola Gatti, and Nick Jennings. 2013. Introducing alarms in adversarial patrolling games. In Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 1275–1276.
[25]
Muhammad Numan, Fazli Subhan, Wazir Zada Khan, Saqib Hakak, Sajjad Haider, G. Thippa Reddy, Alireza Jolfaei, and Mamoun Alazab. 2020. A systematic review on clone node detection in static wireless sensor networks. IEEE Access 8 (2020), 65450–65461.
[26]
Joseph Redmon, Santosh Divvala, Ross Girshick, and Ali Farhadi. 2016. You only look once: Unified, real-time object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 779–788.
[27]
Rodrigo Roman, Javier Lopez, and Masahiro Mambo. 2018. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems 78 (2018), 680–698.
[28]
Syed Bilal Shah, Chen Zhe, Fuliang Yin, Inam Ullah Khan, Seema Begum, Muhammad Faheem, and Fakhri Alam Khan. 2018. 3D weighted centroid algorithm & RSSI ranging model strategy for node localization in WSN based on smart devices. Sustainable Cities & Society 39 (2018), 298–308.
[29]
Syed Bilal Hussain Shah, Zhe Chen, Fuliang Yin, Inam Ullah Khan, and Niqash Ahmad. 2018. Energy and interoperable aware routing for throughput optimization in clustered IoT-wireless sensor networks. Future Generation Computer Systems 81 (2018), 372–381.
[30]
Jie Shen, Ana Lucia Varbanescu, Yutong Lu, Peng Zou, and Henk Sips. 2015. Workload partitioning for accelerating applications on heterogeneous platforms. IEEE Transactions on Parallel and Distributed Systems 27, 9 (2015), 2766–2780.
[31]
Syed Noorulhassan Shirazi, Antonios Gouglidis, Arsham Farshad, and David Hutchison. 2017. The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE Journal on Selected Areas in Communications 35, 11 (2017), 2586–2595.
[32]
Priya R. M. Swarna, Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, Siva Rama Krishnan Somayaji, and Thippa Reddy Gadekallu. 2020. Load balancing of energy cloud using wind driven and firefly algorithms in internet of everything. Journal of Parallel & Distributed Computing (2020), 32–41.
[33]
Reddy G. Thippa, Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, Saqib Hakak, and Usman Tariq. 2020. Antlion re-sampling based deep neural network model for classification of imbalanced multimodal stroke dataset. Multimedia Tools and Applications (2020), 1–25.
[34]
C. Wu, X. Wang, M. Chen, and J. K. Mi. 2019. Differential received signal strength based RFID positioning for construction equipment tracking. Advanced Engineering Informatics 42 (2019), 100960.
[35]
A. Xf, B. Gf, B. Pp, B. Ga, and C. Wl. 2020. Environment-fusion multipath routing protocol for wireless sensor networks. Information Fusion 53 (2020), 4–19.
[36]
Q. Xue, Y. Zhu, and J. Wang. 2019. Joint distribution estimation and naive Bayes classification under local differential privacy. IEEE Transactions on Emerging Topics in Computing (2019), 1–1.
[37]
Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintveld, Vincent Conitzer, and Milind Tambe. 2010. Stackelberg vs. Nash in security games: Interchangeability, equivalence, and uniqueness. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: Volume 1. International Foundation for Autonomous Agents and Multiagent Systems, 1139–1146.
[38]
Q. Zhu. 2020. Research on road traffic situation awareness system based on image big data. IEEE Intelligent Systems 35, 1 (2020), 18–26.

Cited By

View all

Index Terms

  1. Enhancing Security-Problem-Based Deep Learning in Mobile Edge Computing

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Internet Technology
    ACM Transactions on Internet Technology  Volume 22, Issue 2
    May 2022
    582 pages
    ISSN:1533-5399
    EISSN:1557-6051
    DOI:10.1145/3490674
    • Editor:
    • Ling Liu
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 May 2022
    Accepted: 01 March 2021
    Revised: 01 November 2020
    Received: 01 September 2020
    Published in TOIT Volume 22, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Mobile edge computing
    2. synthetic theories
    3. mobile device
    4. suboptimal
    5. security strategies
    6. quality of service
    7. deep learning

    Qualifiers

    • Research-article
    • Refereed

    Funding Sources

    • National Nature Science Foundation of China

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)46
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 22 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media