A Mobile Offloading Game Against Smart Attacks

Mobile devices, such as smartphones, can offload applications and data to the cloud via access points or base stations to reduce energy consumption and improve user experience. However, mobile offloading is vulnerable to smart attackers that use smart and programmable radio devices, such as universal software radio peripherals, to perform multiple types of attacks, such as spoofing and jamming, based on the radio environment and offloading transmissions. In this paper, a mobile offloading game is investigated that consists of three players: a mobile device that chooses its offloading rate, a smart attacker that determines its attack mode, and a security agent that decides whether or not to initiate full protection for the serving access point during the offloading. Nash and Stackelberg equilibria of the offloading game are derived and their existence conditions are discussed. A Q-learning-based mobile offloading strategy is proposed for mobile devices that are unaware of system parameters, such as the channel conditions, in dynamic radio environments. Simulation results show that the proposed offloading strategy can improve the utility of the mobile device and reduce the attack rate of smart attackers.

[1]  Xu Chen,et al.  Decentralized Computation Offloading Game for Mobile Cloud Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[2]  Larry J. Greenstein,et al.  Channel-based spoofing detection in frequency-selective rayleigh channels , 2009, IEEE Transactions on Wireless Communications.

[3]  Jong Hyuk Park,et al.  SSP-MCloud: A Study on Security Service Protocol for Smartphone Centric Mobile Cloud Computing , 2011 .

[4]  A. Lee Swindlehurst,et al.  Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.

[5]  Dusit Niyato,et al.  Offloading in Mobile Cloudlet Systems with Intermittent Connectivity , 2015, IEEE Transactions on Mobile Computing.

[6]  Chun Chen,et al.  Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.

[7]  Liang Xiao,et al.  Mobile crowdsensing game in vehicular networks , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.

[8]  H. Vincent Poor,et al.  A Game Theoretic Analysis of Secret and Reliable Communication With Active and Passive Adversarial Modes , 2016, IEEE Transactions on Wireless Communications.

[9]  Zhu Han,et al.  A distributed ADMM approach for mobile data offloading in software defined network , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[10]  Katinka Wolter,et al.  Analysis of the Energy-Response Time Tradeoff for Mobile Cloud Offloading Using Combined Metrics , 2015, 2015 27th International Teletraffic Congress.

[11]  Cheng Wang,et al.  Computation offloading to save energy on handheld devices: a partition scheme , 2001, CASES '01.

[12]  Ashutosh Sabharwal,et al.  Design of WARP: A wireless open-access research platform , 2006, 2006 14th European Signal Processing Conference.

[13]  Yi Sun,et al.  Analysis of the Energy-Response Time Tradeoff for Delayed Mobile Cloud Offloading , 2015, PERV.

[14]  H. Vincent Poor,et al.  User-Centric View of Jamming Games in Cognitive Radio Networks , 2015, IEEE Transactions on Information Forensics and Security.

[15]  A. Lee Swindlehurst,et al.  Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[16]  Katinka Wolter,et al.  Security and Performance Tradeoff Analysis of Mobile Offloading Systems Under Timing Attacks , 2015, EPEW.

[17]  Liang Xiao,et al.  Mobile cloud offloading for malware detections with learning , 2015, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[18]  H. Vincent Poor,et al.  Mobile offloading game against smart attacks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[19]  Massoud Pedram,et al.  A Nested Two Stage Game-Based Optimization Framework in Mobile Cloud Computing System , 2013, 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering.

[20]  Yung-Hsiang Lu,et al.  Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.

[21]  Bart De Schutter,et al.  A Comprehensive Survey of Multiagent Reinforcement Learning , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[22]  Hung-Min Sun,et al.  Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[23]  H. Vincent Poor,et al.  Incorporating Attack-Type Uncertainty Into Network Protection , 2014, IEEE Transactions on Information Forensics and Security.

[24]  Prasant Mohapatra,et al.  Dynamic defense strategy against advanced persistent threat with insiders , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[25]  Massoud Pedram,et al.  A semi-Markovian decision process based control method for offloading tasks from mobile devices to the cloud , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).