当前位置: X-MOL 学术J. Intell. Fuzzy Syst. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Optimal defense strategy model based on differential game in edge computing
Journal of Intelligent & Fuzzy Systems ( IF 2 ) Pub Date : 2020-08-31 , DOI: 10.3233/jifs-179919
Yan Sun 1 , Yaobing Li 1 , Xuehong Chen 1 , Jun Li 1
Affiliation  

Edge computing extends the cloud computing paradigm to the edge of the network to offset the shortcomings of traditional cloud computing in mobile support, low delay, and location awareness. However, traditional complicated encryption algorithms, access control measures, identification protocols, and privacy protection methods are inapplicable to security defense of edge computing given the multisource data fusion characteristics of edge computing, superposition of mobile and the Internet, and resource limitations in storage, computing, and battery capacity of edge terminals. Therefore, a reasonable defense model for complicated dynamic edge computing environment must be established. In accordance with the characteristics of limited resources of edge devices, combined with dynamic game theory, this study proposes an optimal defense strategy model based on a differential game and solves the optimal defense strategy of edge nodes in infinite and finite-horizons. The optimal defense strategy of the edge nodes was simulated under different conditions, and the simulation verifies that the edge nodes can obtain the optimal defense effect with minimum resource consumption when cooperating to form the defense system.

中文翻译:

边缘计算中基于差分博弈的最优防御策略模型

边缘计算将云计算范式扩展到网络边缘,以弥补传统云计算在移动支持,低延迟和位置感知方面的缺点。但是,鉴于边缘计算的多源数据融合特性,移动和Internet的叠加以及存储,计算中的资源限制,传统的复杂加密算法,访问控制措施,标识协议和隐私保护方法不适用于边缘计算的安全防御。 ,以及边缘端子的电池容量。因此,必须为复杂的动态边缘计算环境建立合理的防御模型。根据边缘设备资源有限的特点,结合动态博弈论,该研究提出了一种基于差分博弈的最优防御策略模型,并解决了无限和有限水平条件下边缘节点的最优防御策略。在不同条件下对边缘节点的最优防御策略进行了仿真,仿真验证了边缘节点协同组成防御系统能够以最小的资源消耗获得最优的防御效果。
更新日期:2020-09-02
down
wechat
bug