Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A camouflage attack detection method based on a DQL algorithm in fog computing

A detection method, fog computing technology, applied in security devices, electrical components, wireless communication, etc., can solve the lack of research on the randomness of wireless channel movement, without considering the application of physical layer security technology, masquerading attacks by malicious users in fog computing networks, etc. problems, to achieve the effect of improving overestimation problems, enhancing security protection capabilities, and solving threshold problems

Active Publication Date: 2019-05-21
BEIJING UNIV OF TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, because the behavior between fog nodes and end users is often easily exposed in wireless networks, fog computing networks are vulnerable to masquerading attacks by malicious users.
At the same time, most of the existing methods protect the fog computing network by using the security technology of the application layer without considering the application of the security technology of the physical layer in the fog computing network. Research can enhance the security of the key, so that the key is directly generated by both parties based on the wireless channel, without the need for a key management center and key distribution process, and the physical layer security technology is independent of the computational complexity, which can solve security problems simply and efficiently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A camouflage attack detection method based on a DQL algorithm in fog computing
  • A camouflage attack detection method based on a DQL algorithm in fog computing
  • A camouflage attack detection method based on a DQL algorithm in fog computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The present invention obtains a fog computing masquerading detection method based on the DQL algorithm, designs a masquerading attack security model in fog computing, and adopts this method to detect masquerading attacks; through detection by this method, the detection threshold can be optimized, solving the problem The threshold problem of detecting masquerading attacks improves the accuracy of detection; at the same time, it enhances the security protection capability of the fog computing network.

[0076] The present invention adopts following technical scheme and implementation steps:

[0077] 1. Masquerade Attack Security Model in Fog Computing

[0078] The security model of the present invention is oriented to fog nodes and end users, and considers the wireless network between fog nodes and end users. Suppose there are a sending end, r receiving end, h legal nodes and i illegal nodes, among which:

[0079]

[0080]

[0081] like figure 1 shown. A rogue n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a camouflage attack detection method based on a DQL algorithm in fog computing, relates to the field of computer networks and wireless communication, and belongs to the field of network space security. According to the invention, channel parameters and a DQL (Double Q-learning) algorithm in a physical layer security technology are utilized, so camouflage attack detection between a fog layer and a user layer in a fog calculation environment is achieved, wherein the camouflage attack allows a legal fog node or a user receiving end to receive a fake data pack to influencesafety communication between the fog node and a mobile user in the fog calculation network. Camouflage attack is detected based on a DQL algorithm, the excessive estimation problem of Q values in theQ-learning algorithm are overcome, the accuracy rate of receiving the data packet by the receiving end in the dynamic environment can be increased, the false alarm rate and the missing detection rateof detecting the camouflage attack by the receiving end can be reduced, and meanwhile, the safety protection capability in the fog computing network is enhanced.

Description

technical field [0001] The present invention uses the channel parameters and DQL (Double Q-learning, DQL) algorithm in the physical layer security technology to realize the masquerade attack detection between the fog layer and the user layer in the fog computing environment. False data packets can affect the secure communication between fog nodes and mobile users in the fog computing network. Based on the DQL algorithm to detect masquerade attacks, it improves the overestimation of the Q value in the Q-learning algorithm, which can not only increase the accuracy of the data packets received by the receiving end in a dynamic environment, but also reduce the false alarm rate when the receiving end detects masquerading attacks and missed detection rate, while enhancing the security protection capabilities in the fog computing network. The use of reinforcement learning algorithms and channel parameters to detect masquerade attacks not only involves the fields of computer networks...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/12H04W12/122
Inventor 涂山山孟远于金亮
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products