每年出版 12 期
ISSN 打印: 0040-2508
ISSN 在线: 1943-6009
Indexed in
DATA INFORMATION SECURITY OF COMMUNICATION NETWORK BASED ON EDGE COMPUTING TECHNOLOGY AND BP NEURAL NETWORK
摘要
Edge computing technology can effectively reduce the pressure of the cloud center and improve the efficiency of data processing, and its data security issues have attracted wide attention. This study focuses on the detection of cloning attacks in edge computing. First, the clone nodes were identified by channel authentication, then the training set was established to train Back Propagation Neural Network (BPNN), and finally unknown nodes were detected by the trained model. The experiment showed that the method achieved the highest recognition accuracy when the number of neurons was 3, and the accuracy of detecting the testing test set was 89.6%. Compared with Efficient Distributed Detection (EDD) algorithm, the method had higher average accuracy, 87.77%, and lower energy consumption, 44 J, which suggests the method, was reliable. This research provides a new method for cloning attack detection, which is conducive to improving the security of edge computing and promoting the higher and faster development of edge computing.
-
Aral, A. and Ovatman, T., (2018) A decentralized replica placement algorithm for edge computing, IEEE T. Netw. Serv. Man., 15(2), pp. 516-529.
-
Shi, W. and Dustdar, S., (2016) The promise of edge computing, Computer, 49(5), pp. 78-81.
-
Tran, T.X., Hajisami, A., Pandey, P., and Pompili, D., (2017) Collaborative mobile edge computing in 5g networks: new paradigms, scenarios, and challenges, IEEE Commun. Mag., 55(4), pp. 54-61.
-
Park, D., Kim, S., An, Y., and Jung, J.Y., (2018) LiReD: A light-weight real-time fault detection system for edge computing using LSTM recurrent neural networks, Sensors, 18(7), pp. 2110.
-
Rathore, S., Sharma, P.K., Sangaiah, A.K., and Park, J.J., (2017) A hesitant fuzzy-based security approach for fog and mobile edge computing, IEEE Access, pp. 688-701.
-
Klonoff, D.C., (2017) Fog computing and edge computing architectures for processing data from diabetes devices connected to the medical internet of things, J. Diabet. Sci. Tech., 11(4), pp. 647-652.
-
Garg, S., Singh, A., Kaur, K., Aujla, G.S. et al., (2019) Edge computing-based security framework for big data analytics in VANETs, IEEE Netw., 33(2), pp. 72-81.
-
Zhang, J., Chen, B., Zhao, Y., Cheng, X., and Hu, F., (2018) Data security and privacy-preserving in edge computing paradigm: survey and open issues, IEEE Access, pp. 18209-18237.
-
Satyanarayanan, M., (2017) Edge computing, Computer, 50(10), pp. 36-38.
-
Roman, R., Lopez, J., and Mambo, M., (2016) Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges, Future Gener. Comput. Syst., pp. S0167739X16305635.
-
Lin, F., Zhou, Y., An, X., You, I., and Choo, K.K.R., (2018) Fair resource allocation in an intrusion-detection system for edge computing: ensuring the security of internet of things devices, IEEE Consum. Electr. M., 7(6), pp. 45-50.
-
Li, J.Y., (2014) Bp neural network optimized by PSO and its application in function approximation, Adv. Mater. Res., pp. 945-949.
-
Zhu, B., Addada, V.G.K., Setia, S., Jajodia, S., and Roy, S. (2007) Efficient distributed detection of node replication attacks in sensor networks, Twenty-Third Ann. Comput. Sec. Appl. Conf. (ACSAC 2007), pp. 257-267.
-
Tu, Y.F., Dong, Z.J., and Yang, H.Z., (2017) Key technologies and application of edge computing, ZTE Commun., 15(2), pp. 26-34.
-
Esposito, C., Castiglione, A., Pop, F., and Choo, K.K.R., (2017) Challenges of connecting edge and cloud computing: a security and forensic perspective, IEEE Cloud Comput., 4(2), pp. 13-17.