Celebrating the 100th Anniversary of Yunnan University—Securing Mobile Edge Computing: Challenges and Solutions for Edge Architectures

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 15 July 2024 | Viewed by 3605

Special Issue Editors


E-Mail Website
Guest Editor
National Pilot School of Software, Yunnan University, Kunming 650091, China
Interests: network security; mobile edge computing; edge AI techniques

E-Mail Website
Guest Editor
Department of Computer Science, Norwegian University of Science and Technology, 7491 Trondheim, Norway
Interests: edge intelligence; embedded systems; real-time scheduling

E-Mail Website
Guest Editor
National Pilot School of Software, Yunnan University, Kunming 650091, China
Interests: network and cyberspace security; artificial intelligence; machine learning

Special Issue Information

Dear Colleagues,

Mobile Edge Computing (MEC) has emerged as a promising solution to meet the growing demand for low-latency and high-bandwidth applications and services such as augmented reality, autonomous vehicles, and smart cities. However, MEC nodes are often limited by computing resources, storage capacity, and energy resources, which makes them vulnerable to a range of malicious attacks such as DDoS attacks, malware, and privacy breaches. This, in turn, poses significant challenges in building a secure and robust MEC system that is capable of functioning effectively on edge architecture. As a result, there is a pressing need for research and development efforts to address the technical challenges ahead and ensure that MEC networks are resilient against various forms of cyber threats.

This Special Issue aims to gather original and high-quality research papers that present recent advances and innovative solutions in the security and defense of MEC. In this Special Issue, original research articles and reviews are welcome. Research areas may include (but are not limited to) the following:

  • Resource allocation for MEC networks
  • MEC security and privacy
  • MEC-based federated learning
  • MEC-enabled application security
  • MEC-based privacy protection
  • Edge intelligence and machine learning at the edge
  • MEC-oriented adversarial attacks and defense
  • Security and privacy issues in integrated sensing/communication networks
  • The design of security in edge paradigms
  • Privacy leakage, service manipulation, and rogue infrastructure against MEC infrastructure
  • Attacks targeting virtualization infrastructure
  • Injection of information and service manipulation by MEC devices
  • Protocol and network security in MEC
  • Trust management in MEC
  • Intrusion detection systems in MEC
  • Access control systems for MEC

We look forward to receiving your contributions.

Dr. Mingxiong Zhao
Dr. Di Liu
Dr. Yunchun Zhang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • MEC
  • privacy protection
  • edge paradigm
  • computing migration security

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 636 KiB  
Article
A Robust CNN for Malware Classification against Executable Adversarial Attack
by Yunchun Zhang, Jiaqi Jiang, Chao Yi, Hai Li, Shaohui Min, Ruifeng Zuo, Zhenzhou An and Yongtao Yu
Electronics 2024, 13(5), 989; https://doi.org/10.3390/electronics13050989 - 05 Mar 2024
Viewed by 666
Abstract
Deep-learning-based malware-detection models are threatened by adversarial attacks. This paper designs a robust and secure convolutional neural network (CNN) for malware classification. First, three CNNs with different pooling layers, including global average pooling (GAP), global max pooling (GMP), and spatial pyramid pooling (SPP), [...] Read more.
Deep-learning-based malware-detection models are threatened by adversarial attacks. This paper designs a robust and secure convolutional neural network (CNN) for malware classification. First, three CNNs with different pooling layers, including global average pooling (GAP), global max pooling (GMP), and spatial pyramid pooling (SPP), are proposed. Second, we designed an executable adversarial attack to construct adversarial malware by changing the meaningless and unimportant segments within the Portable Executable (PE) header file. Finally, to consolidate the GMP-based CNN, a header-aware loss algorithm based on the attention mechanism is proposed to defend the executive adversarial attack. The experiments showed that the GMP-based CNN achieved better performance in malware detection than other CNNs with around 98.61% accuracy. However, all CNNs were vulnerable to the executable adversarial attack and a fast gradient-based attack with a 46.34% and 34.65% accuracy decline on average, respectively. Meanwhile, the improved header-aware CNN achieved the best performance with an evasion ratio of less than 5.0%. Full article
Show Figures

Figure 1

17 pages, 3201 KiB  
Article
An Improved Gravitational Search Algorithm for Task Offloading in a Mobile Edge Computing Network with Task Priority
by Ling Xu, Yunpeng Liu, Bing Fan, Xiaorong Xu, Yiguo Mei and Wei Feng
Electronics 2024, 13(3), 540; https://doi.org/10.3390/electronics13030540 - 29 Jan 2024
Viewed by 579
Abstract
Mobile edge computing (MEC) distributes computing and storage resources to the edge of the network closer to the user and significantly reduces user task completion latency and system energy consumption. This paper investigates the problem of computation offloading in a three-tier mobile edge [...] Read more.
Mobile edge computing (MEC) distributes computing and storage resources to the edge of the network closer to the user and significantly reduces user task completion latency and system energy consumption. This paper investigates the problem of computation offloading in a three-tier mobile edge computing network composed of multiple users, multiple edge servers, and a cloud server. In this network, each user’s task can be divided into multiple subtasks with serial and parallel priority relationships existing among these subtasks. An optimization model is established with the objective of minimizing the total user delay and processor cost under constraints such as the available resources of users and servers and the interrelationships among the subtasks. An improved gravitational search algorithm (IGSA) is proposed to solve this optimization model. In contrast with the other gravitational search algorithm, the convergence factor is introduced in the calculation of the resultant force and the crossover operation in a genetic algorithm is performed when generating the new particles during each iteration. The simulation results show that the proposed IGSA greatly improves the system performance compared with the existing algorithms. Full article
Show Figures

Figure 1

21 pages, 1861 KiB  
Article
Learning-Based Collaborative Computation Offloading in UAV-Assisted Multi-Access Edge Computing
by Zikun Xu, Junhui Liu, Ying Guo, Yunyun Dong and Zhenli He
Electronics 2023, 12(20), 4371; https://doi.org/10.3390/electronics12204371 - 22 Oct 2023
Viewed by 846
Abstract
Unmanned aerial vehicles (UAVs) have gained considerable attention in the research community due to their exceptional agility, maneuverability, and potential applications in fields like surveillance, multi-access edge computing (MEC), and various other domains. However, efficiently providing computation offloading services for concurrent Internet of [...] Read more.
Unmanned aerial vehicles (UAVs) have gained considerable attention in the research community due to their exceptional agility, maneuverability, and potential applications in fields like surveillance, multi-access edge computing (MEC), and various other domains. However, efficiently providing computation offloading services for concurrent Internet of Things devices (IOTDs) remains a significant challenge for UAVs due to their limited computing and communication capabilities. Consequently, optimizing and managing the constrained computing, communication, and energy resources of UAVs are essential for establishing an efficient aerial network infrastructure. To address this challenge, we investigate the collaborative computation offloading optimization problem in a UAV-assisted MEC environment comprising multiple UAVs and multiple IODTs. Our primary objective is to obtain efficient offloading strategies within a multi-heterogeneous UAV environment characterized by limited computing and communication capabilities. In this context, we model the problem as a multi-agent markov decision process (MAMDP) to account for environmental dynamics. We employ a multi-agent deep deterministic policy gradient (MADDPG) approach for task offloading. Subsequently, we conduct simulations to evaluate the efficiency of our proposed offloading scheme. The results highlight significant improvements achieved by the proposed offloading strategy, including a notable increase in the system completion rate and a significant reduction in the average energy consumption of the system. Full article
Show Figures

Figure 1

22 pages, 67283 KiB  
Article
Binary-Convolution Data-Reduction Network for Edge–Cloud IIoT Anomaly Detection
by Cheng Xie, Wenbiao Tao, Zuoying Zeng and Yuran Dong
Electronics 2023, 12(15), 3229; https://doi.org/10.3390/electronics12153229 - 26 Jul 2023
Cited by 1 | Viewed by 906
Abstract
Industrial anomaly detection, which relies on the analysis of industrial internet of things (IIoT) sensor data, is a critical element for guaranteeing the quality and safety of industrial manufacturing. Current solutions normally apply edge–cloud IIoT architecture. The edge side collects sensor data in [...] Read more.
Industrial anomaly detection, which relies on the analysis of industrial internet of things (IIoT) sensor data, is a critical element for guaranteeing the quality and safety of industrial manufacturing. Current solutions normally apply edge–cloud IIoT architecture. The edge side collects sensor data in the field, while the cloud side receives sensor data and analyzes anomalies to accomplish it. The more complete the data sent to the cloud side, the higher the anomaly-detection accuracy that can be achieved. However, it will be extremely expensive to collect all sensor data and transmit them to the cloud side due to the massive amounts and distributed deployments of IIoT sensors requiring expensive network traffics and computational capacities. Thus, it becomes a trade-off problem: “How to reduce data transmission under the premise of ensuring the accuracy of anomaly detection?”. To this end, the paper proposes a binary-convolution data-reduction network for edge–cloud IIoT anomaly detection. It collects raw sensor data and extracts their features at the edge side, and receives data features to discover anomalies at the cloud side. To implement this, a time-scalar binary feature encoder is proposed and deployed on the edge side, encoding raw data into time-series binary vectors. Then, a binary-convolution data-reduction network is presented at the edge side to extract data features that significantly reduce the data size without losing critical information. At last, a real-time anomaly detector based on hierarchical temporal memory (HTM) is established on the cloud side to identify anomalies. The proposed model is validated on the NAB dataset, and achieves 70.0, 64.6 and 74.0 on the three evaluation metrics of SP, RLFP and RLFN, while obtaining a reduction rate of 96.19%. Extensive experimental results demonstrate that the proposed method achieves new state-of-the-art results in anomaly detection with data reduction. The proposed method is also deployed on a real-world industrial project as a case study to prove the feasibility and effectiveness of the proposed method. Full article
Show Figures

Figure 1

Back to TopTop