Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Invisible interference attack protection method and system for sensing edge cloud unloading link

A link and edge technology, applied in the field of the Internet of Things, can solve the problems of inability to effectively deal with the decline of offloading capacity of invisible attackers, no solution given, modeling and analysis of offloading links, etc., to eliminate task offloading failures and eliminate offloading The effect of link blocking

Pending Publication Date: 2022-05-13
SHAOXING UNIVERSITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) The proposed method considers the time-varying interference attacker, and cannot effectively deal with the offloading capacity drop caused by the interference of the stealth attacker on the computing task offloading link
[0007] (2) Although the proposed solution uses a learning-based algorithm to defend against jamming attacks, how does the sensing device cluster defend against the nonlinear jamming characteristics of stealth jamming attackers by coordinating multi-channel resource defense? The above method No suitable solution was given
[0008] (3) Although the existing methods can resist jamming attacks, they have not modeled and analyzed the working mode of offloading links caused by jamming behaviors, so no adaptive mechanism has been designed to respond and coordinate stealth jamming attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Invisible interference attack protection method and system for sensing edge cloud unloading link
  • Invisible interference attack protection method and system for sensing edge cloud unloading link
  • Invisible interference attack protection method and system for sensing edge cloud unloading link

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0060] The invisible interference attack protection method of the sensing edge cloud offloading link provided by the present invention is applied to the edge cloud offloading link constructed by the sensing device node, the sensing device cluster head node, and the sensing cloud edge node, such as figure 1 shown, including the following steps:

[0061] (1) Turn on intrusion detection (IDS detection), update the offloadi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an invisible interference attack protection method and system for a sensing edge cloud unloading link, and aims to respond to behaviors of an invisible interference attacker by dynamically adjusting channel resources of sensing equipment in a sensing cluster so as to realize self-adaption to intrusion of the invisible interference attacker. Due to limited computing resources of a single sensing equipment node and distributed nonlinear interference attack characteristics of invisible attackers, detection and defense of the invisible interference attackers cannot be efficiently realized, and cooperative defense must be realized through collective interaction of the whole sensing equipment cluster and the invisible attackers. According to the method, the working mode of the unloading link is learned from past historical experience to optimize channel allocation to respond to the invisible interference attack, so that unloading link blockage caused by the invisible interference attack is eliminated more quickly, and the process is formalized as a reinforcement learning problem using a Markov decision process; and an optimal mode is automatically found, and an idle channel is activated to resist invisible interference attacks.

Description

technical field [0001] The invention belongs to the field of the Internet of Things, and more specifically relates to a method and system for protecting against stealth interference attacks of sensing edge cloud offloading links. Background technique [0002] The sensing edge cloud architecture provides an efficient computing mode for intelligent computing. Computing tasks are offloaded to edge nodes through cluster head nodes to save computing resources of sensing devices. However, in an open and broadcast wireless environment, the computing task offloading link is vulnerable to interference attacks, resulting in the failure of computing task offloading. With the development of artificial intelligence technology, jamming attackers are becoming more and more intelligent. Among them, stealth jamming attack is a kind of intelligent attack, and its attack behavior is concealed, especially when jamming attacks on multiple channels in the sensor cluster. , the attack process pre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/122H04W40/32H04W84/18
CPCH04W12/122H04W40/32H04W84/18Y02D30/70
Inventor 刘建华薛广涛李明禄
Owner SHAOXING UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products