Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning

Internet of Things realizes the leap from traditional industry to intelligent industry. However, it makes edge devices more vulnerable to attackers during processing perceptual data in real time. To solve the above problem, we use the zero-sum game to build the interactions between attackers and edge devices and propose an antiattack scheme based on deep reinforcement learning. Firstly, we make the k NN-DTW algorithm to find a sample that is similar to the current sample and use the weighted moving mean method to calculate the mean and the variance of the samples. Secondly, to solve the overestimation problem, we develop an optimal strategy algorithm to find the optimal strategy of the edge devices. Experimental results prove that the new scheme improves the payoff of attacked edge devices and decreases the payoff of attackers, thus forcing the attackers to give up the attack.

[1]  Jiguo Yu,et al.  Multi-Armed-Bandit-Based Spectrum Scheduling Algorithms in Wireless Networks: A Survey , 2020, IEEE Wireless Communications.

[2]  Mikael Rönnqvist,et al.  Coalition formation in collaborative production and transportation with competing firms , 2021, Eur. J. Oper. Res..

[3]  Tie Qiu,et al.  Two-Stage Game Design of Payoff Decision-Making Scheme for Crowdsourcing Dilemmas , 2020, IEEE/ACM Transactions on Networking.

[4]  Theodoros Tsiligkaridis,et al.  Information Aware max-norm Dirichlet networks for predictive uncertainty estimation , 2019, Neural Networks.

[5]  Dongsu Han,et al.  A Secure Middlebox Framework for Enabling Visibility Over Multiple Encryption Protocols , 2020, IEEE/ACM Transactions on Networking.

[6]  Jiguo Yu,et al.  Faster Parallel Core Maintenance Algorithms in Dynamic Graphs , 2020, IEEE Transactions on Parallel and Distributed Systems.

[7]  Dong Dong,et al.  Evaluation of the intelligent logistics eco-index: Evidence from China , 2020 .

[8]  Shiva Raj Pokhrel,et al.  Adaptive Admission Control for IoT Applications in Home WiFi Networks , 2020, IEEE Transactions on Mobile Computing.

[9]  Xiangjian He,et al.  Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[10]  Miao Pan,et al.  Data-Driven Spectrum Trading with Secondary Users’ Differential Privacy Preservation , 2019, IEEE Transactions on Dependable and Secure Computing.

[11]  Ximeng Liu,et al.  Person Re-Identification over Encrypted Outsourced Surveillance Videos , 2019, IEEE Transactions on Dependable and Secure Computing.

[12]  Feng Li,et al.  Privacy-Preserving Collaborative Learning for Multiarmed Bandits in IoT , 2021, IEEE Internet of Things Journal.

[13]  Wouter Joosen,et al.  Predicting Vulnerable Software Components via Text Mining , 2014, IEEE Transactions on Software Engineering.

[14]  Bernardo Henz,et al.  Synthesizing Camera Noise Using Generative Adversarial Networks , 2020, IEEE Transactions on Visualization and Computer Graphics.

[15]  Ximeng Liu,et al.  Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud , 2021, IEEE Transactions on Dependable and Secure Computing.

[16]  Feng Li,et al.  Distributed learning dynamics of Multi-Armed Bandits for edge intelligence , 2020, J. Syst. Archit..

[17]  Junhu Ruan,et al.  Fertigation management for sustainable precision agriculture based on Internet of Things , 2020 .

[18]  Mojtaba Alizadeh,et al.  Authentication in mobile cloud computing: A survey , 2016, J. Netw. Comput. Appl..

[19]  Yi Liang,et al.  Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices , 2018, IEEE Network.

[20]  Xiaoyu Ruan,et al.  Platform Embedded Security Technology Revealed , 2014, Apress.

[21]  Hamid Reza Shahriari,et al.  Neural software vulnerability analysis using rich intermediate graph representations of programs , 2021, Inf. Sci..

[22]  Qun Li,et al.  Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.

[23]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[24]  Qi Li,et al.  Operation Optimization and Control Method Based on Optimal Energy and Hydrogen Consumption for the Fuel Cell/Supercapacitor Hybrid Tram , 2021, IEEE Transactions on Industrial Electronics.

[25]  Zhipeng Cai,et al.  Task Scheduling in Deadline-Aware Mobile Edge Computing Systems , 2019, IEEE Internet of Things Journal.

[26]  Xingyu Fu,et al.  Robust Log-Optimal Strategy with Reinforcement Learning , 2018 .

[27]  Zhipeng Cai,et al.  Privacy-Preserved Data Sharing Towards Multiple Parties in Industrial IoTs , 2020, IEEE Journal on Selected Areas in Communications.

[28]  Yingshu Li,et al.  Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[29]  Tuo Shi,et al.  Distributed Query Processing in the Edge-Assisted IoT Data Monitoring System , 2021, IEEE Internet of Things Journal.

[30]  Chunqiang Hu,et al.  Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.