Font Size: a A A

Game Theoretic Secure Routing Selection In MEC-D2D Communication Systems

Posted on:2021-01-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y M LvFull Text:PDF
GTID:2518306107483414Subject:Engineering
Abstract/Summary:PDF Full Text Request
Device-to-device(D2D)communication,as one of the key technologies for the 5thgeneration mobile networks to support Io T application,can provide end-to-end services and implement energy-efficient communication,migration computing,migration connections,and high throughput.Mobile edge computing(MEC)can reduce the processing requirements,cost,and complexity of the device,and reduce processing latency,support ultra-high reliability,and low-latency industrial Io T applications by migrating computing tasks from smart devices to edge cloud server(ECS)processing.In the MEC-D2D communication system formed by combining MEC and D2D communication,MEC serves as an intermediate layer between the D2D cluster and the cloud computing center and aims to provide low-latency communication services for devices through local short-range wireless connections.The unique distributed architecture of D2D communication causes the system to face severe security threats,and the widespread application of new technologies such as D2D communication and mobile edge computing will also spawn new types of malware.On the one hand,the routing decision can use the antivirus software configured on the device to realize the collaborative detection of malware,on the other hand,using the cooperative relationship of D2D communication,the devices can also use each other's contributions to detect the malware.This paper studies the secure routing selection strategy in the MEC-D2D communication system,which aims to improve the detection performance of malware by optimizing routing decisions;combine the defense capabilities against malware,identifying and selecting the best route based on game theory.The main tasks as follows:(1)Determined the system model for the integration of MEC and D2D communication.The ECS deployed at the edge of the D2D cluster can ensure that the cluster-head is a trusted node and provide specific services for member nodes in the cluster.The data packet delivery method and the adversarial model composed of software and anti-malware controls are also specified,which defines the Secure Route and clarifies a joint detection model for Secure Routes.(2)Based on the system model and the joint detection model,a secure routing game model is established.The model also considered the Nash game where the attacker had selected malware before entering the MEC-D2D communication system and the Stackelberg game where the attacker selects the malware after the secure routing of the communication is selected?It is proved that whether it is a zero-sum game or a non-zero-sum game,whether it is a Nash game or a Stackelberg game,the cluster head's NRP-based secure routing is the optimal strategy.(3)Proposed a Cluster-head Centered Fast Secure Routing-CCFSR protocol,describe the protocol's process of obtaining network topology,searching for available routes,and electing secure routes based on Nash routing plan,and explain the specific implementation of the CCFSR protocol,including obtaining update and maintenance of neighbor nodes in the network topology process,managing the network topology through incremental packets and topology lists of cluster-head,updating the conditions for secure routing,and different roles played by member nodes,and designed routing table according to the different roles played by member nodes and the cluster-head.The designed CCFSR is implemented in the network simulation software OMNe T++,and the experimental results are analyzed.It is proved that the CCFSR protocol can take into account both network security and quality-of-service,and the attacker uses Stackelberg can maximize the benefits.
Keywords/Search Tags:device-to-device communications, game theory, malware, secure routing
PDF Full Text Request
Related items