Font Size: a A A

Research On Security Defense Model And Algorithm In Edge Computing

Posted on:2020-12-19Degree:DoctorType:Dissertation
Country:ChinaCandidate:L MiaoFull Text:PDF
GTID:1368330575978648Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the development of big data,Internet of Things and 5G network technology,it is difficult to process the massive data generated by the edge smart devices in real time for the cloud-based service model.The development of edge computing not only builds an information interactive bridge between the edge physical world and the network world.It also compensates for the limitations of cloud computing in terms of latency,bandwidth,location awareness,and mobility.However,edge computing has brought a series of new security challenges to edge users' data and edge nodes.On the one hand,edge computing combines various technologies such as wireless sensor network,mobile edge computing and distributed data storage.It is necessary to design a security defense scheme to achieve the unification of defense strategies between different security domains.On the other hand,the deployment of edge devices is closer to the edge users,and the network environment is more complex and unstable.Meanwhile,the traditional security defense technology cannot be applied because of the characteristics of edge nodes,so new security defense schemes need to be designed to deal with them.In this paper,combined with the existing edge computing architecture,we focus on the security defense problem such as malware propagation,data security and the edge network security in edge computing using the mean field game theory,stochastic differential equation theory,epidemic dynamic theory,functional analysis and other mathematical theories.The main works and the results are summarized as follows:(1)The malware propagation models based on the mean field game and the stochastic differential game are proposed respectively.In this framework,we present a security defense algorithm for the end devices.Compared with the traditional deterministic malware defense model,the proposed models not only consider the dynamic interactions of the end devices with the infective,susceptible,recovery and the exposed state,but also the impact of the random fluctuation of the edge network on the end devices.The optimal defense strategies of the end devices under deterministic and random conditions are given,ad the simulation results show that the optimal defense strategies proposed in this paper significantly prevented the spread of malware among end devices.(2)A security defense model for the data security of edge users based on the mean field game is presented.In this framework,we present a security defense algorithm for edge users data security.On the basis of considering the attack intensity and the limited computation resources of end devices,the average loss of edge user data is analyzed by introducing the definition of information entropy.Then,we research the optimal defense strategies for the loss of edge user data and the condition for minimizing the average loss of user data through constructing the first and second-order mean field game models.Finally,the simulation results show that edge users can minimize their data loss while minimizing their device resource consumption according to the proposed model.(3)A security defense model for edge nodes based on the differential game is presented.In this framework,we present a security defense algorithm for edge data centers.Considering the heterogeneity of the edge nodes,the attack frequency,the probability of successful attacks,and the probability of blocking the attacker,we propose the edge node security defense model in the edge computing environment.Then,the feedback Nash equilibrium of the model is discussed in the finite time domain and the infinite time domain respectively,and the optimal defense strategy for each edge node is given.Finally,the simulation results show that for the individual edge node,the optimal defense strategy can be chosen independently on the basis of consuming the least computational resources.(3)A security defense model for edge network based on the mean field game is proposed.In this framework,we present a security defense algorithm for edge network devices.On the basis of researching the relationship between the individual optimal defense strategy and the optimal defense strategy of the whole edge network layer,and combining with the Hilbert space theory,we analyze the existence of the ?-Nash equilibrium solution and the optimal conditions.The simulation results show that for the large-scale edge network equipment,the security defense model proposed in this paper realizes the unification of the individual optimal strategy and the overall optimal strategy of the edge network.
Keywords/Search Tags:Edge computing, Security defense scheme, Mean field game theory, Differential game theory
PDF Full Text Request
Related items