Impersonation Attack Detection in Mobile Edge Computing by Levering SARSA Technique in Physical Layer Security

نویسندگان

چکیده

Smart health systems typically integrate sensor technology with the Internet of Things, enabling healthcare to monitor patients. These biomedical applications collect data through remote sensors and transfer a centralized system for analysis. However, communication between edge node mobile user is susceptible impersonation attacks in computing (MEC) application. For this purpose, we propose detection mechanism medical services, i.e., reinforcement learning attacks. We construct model MEC, key generation (KGM), an attack (IAM). In addition, also design algorithm based on SARSA technique under IAM. our proposed work, SARSA-based method outplays dynamic environment compared traditional Q-learning technique. Finally, evaluate false alarm rate (FAR), miss (MDR), average error (AER) hypothesis tests compare performance Q-learning. comparison classic technique, simulation experiments show that suggested approach can avoid services. The results indicate has high accuracy low conventional approach.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security in Mobile Computing: Attack Vectors, Solutions, and Challenges

With the growth of the mobile industry, a smart phone has the ability to store large amounts of valuable data such as personal and bank information, the users’ location, call logs and more. Thus, the security of data in the mobile world has become an important issue. The main objective of this survey paper is to review the state-of-the-art technologies for the security of mobile computing. It c...

متن کامل

Detection of Impersonation Attack in MANET Using Polynomial Reduction Algorithm

Secure routing among multiple routers become a complex process in Mobile Ad-hoc NETworks (MANETs) due to the presence of adversary nodes. An adversary node which compromises the honest node as well as it will use all secrets of compromised node. By these capabilities, the attacker launches impersonation attacks against secure transmission. Strengthening the personal key and monitoring the behav...

متن کامل

Virtual Physical Security for Mobile Computing Devices

In this paper I have attempted to explain briefly, how enterprise security for Mobile Computing Devices can be achieved in organizations. Enterprise security plans must not only address the data security over the network but also the protection of data at rest on mobile devices like Laptop PCs, PDAs, and Smart phones. The inherent lack of physical access control on mobile devices creates specia...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2022

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app122010225