Abstract
To accommodate heterogeneous tasks in Internet of Things (IoT), a new communication and computing paradigm termed mobile edge computing emerges, extending the computing service from the cloud to edge, but at the same time exposing new challenges on security. The present paper studies online security-aware edge computing under jamming attacks. Leveraging online learning tools, we develop SAVE-S algorithm that is tailored for the stochastic jamming. Without utilizing extra resources such as spectrum and transmission power to evade jamming attacks, SAVE-S can select the most reliable server to offload computing tasks with minimal privacy and security concerns. It is analytically established that without any prior knowledge of future jamming information and server security risks, the proposed scheme can achieve mathrm{O}(sqrt{T}) regret. Information sharing among devices can accelerate the security-aware computing tasks. Incorporating the information shared by other devices, SAVE-S has significant improvements on the sublinear regret, which is guaranteed by what we term value of cooperation. The effectiveness of proposed schemes are tested on both synthetic and real datasets.
Original language | English (US) |
---|---|
Title of host publication | Conference Record of the 52nd Asilomar Conference on Signals, Systems and Computers, ACSSC 2018 |
Editors | Michael B. Matthews |
Publisher | IEEE Computer Society |
Pages | 2149-2153 |
Number of pages | 5 |
ISBN (Electronic) | 9781538692189 |
DOIs | |
State | Published - Jul 2 2018 |
Event | 52nd Asilomar Conference on Signals, Systems and Computers, ACSSC 2018 - Pacific Grove, United States Duration: Oct 28 2018 → Oct 31 2018 |
Publication series
Name | Conference Record - Asilomar Conference on Signals, Systems and Computers |
---|---|
Volume | 2018-October |
ISSN (Print) | 1058-6393 |
Conference
Conference | 52nd Asilomar Conference on Signals, Systems and Computers, ACSSC 2018 |
---|---|
Country/Territory | United States |
City | Pacific Grove |
Period | 10/28/18 → 10/31/18 |
Bibliographical note
Publisher Copyright:© 2018 IEEE.
Keywords
- Cyber security
- jamming attack
- mobile edge computing
- multi-armed bandit
- online learning