检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:孟远 涂山山 于金亮 MENG Yuan;TU Shanshan;YU Jinliang(Faculty of Information Technology,Beijing University of Technology,Beijing 100124,China;Beijing Key Laboratory of Trusted Computing,Beijing 100124,China)
机构地区:[1]北京工业大学信息学部,北京100124 [2]可信计算北京市重点实验室,北京100124
出 处:《计算机工程与应用》2020年第10期63-68,共6页Computer Engineering and Applications
基 金:国家自然科学基金(No.61801008);国家重点研发计划(No.2018YFB0803600);北京市自然科学基金(No.L172049)。
摘 要:雾计算是一种在云数据中心和物联网(Internet of Things,IoT)设备之间提供分布式计算、存储等服务的技术,它能利用网络边缘进行认证并提供与云交互的方法。雾计算中以传统的安全技术实现用户与雾节点间安全性的方法不够完善,它仍然面对着窃听攻击、伪装攻击等安全威胁,这对检测技术提出了新的挑战。针对这一问题,提出了一种基于DQL(Double Q-learning)算法的雾计算伪装攻击检测方案。该方案借助物理层安全技术中的信道参数,首先在Q-learning算法的基础上处理Q值过度估计问题,获取最佳的伪装攻击测试阈值,然后通过阈值实现了用户与雾节点间的伪装攻击检测。实验结果表明,该算法检测伪装攻击的性能优于传统的Q-learning算法,具有在雾计算安全防护方面的优越性。Fog computing is a technology that provides distributed computing,storage and other services between cloud data centers and Internet of Things(IoT)devices.It can utilize network edges to authenticate and provide ways to interact with the clouds.In fog computing,traditional security technology is not perfect enough to realize the security between users and fog nodes.It still faces security threats such as eavesdropping attack and impersonation attack,which poses new challenges to detection technology.To solve this problem,an impersonation attack detection scheme based on DQL(Double Q-learning)algorithm for fog computing is proposed.With the help of channel parameters in the physical layer security technology,at first this proposed scheme processes the overestimation of Q value on the basis of Q-learning algorithm to obtain the optimal impersonation attack test threshold.Then the detection of impersonation attack between users and fog nodes is realized by this threshold.Finally,experimental results show that this algorithm is better than the traditional Q-learning algorithm in detecting impersonation attack,and has advantages in the security protection of fog computing.
关 键 词:雾计算 强化学习 伪装攻击 物理层安全 攻击检测
分 类 号:TP399[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.116.67.226