Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing

Aiming Wu,Shanshan Tu,Junwei Liu,Yihe Zhang,Yongjie Yang,Xuetao Bai
DOI: https://doi.org/10.1145/3586102.3586105
2022-01-01
Abstract:Fog computing is a technology that provides distributed computing, storage and other services between cloud servers and Internet of Things(IoT) devices. It reduces the pressure on cloud servers and utilizes network edges for computing and storage, thereby improving the performance of the entire IoT system. Since fog computing uses traditional security technologies to realize the communication between fog nodes and end users, it is inevitable for fog computing to face some security threats, such as eavesdropping attacks, camouflage attacks and other security threats. Aiming at this problem, this paper proposes a impersonation attack detection scheme based on Sarsa(lambda) algorithm. The scheme first builds a camouflage attack model and a key generation model based on physical layer security technology, then performs hypothesis testing at the receiving end to verify the legitimacy of the training signal, and then obtains the optimal threshold through the proposed algorithm. The optimal threshold realizes the terminal communication security between user nodes and fog nodes. The experimental results show that the algorithm can effectively detect camouflage attacks in a dynamic fog computing environment and have a low average detection error rate. When , AER decreased to 0.4925.
What problem does this paper attempt to address?