物联网学报 ›› 2019, Vol. 3 ›› Issue (3): 76-83.doi: 10.11959/j.issn.2096-3750.2019.00122

所属专题: 边缘计算

• 理论与技术 • 上一篇    下一篇

基于拟态防御原理的分布式多接入边缘计算研究

朱泓艺(),陆肖元,李毅   

  1. 上海宽带技术及应用工程研究中心,上海 200436
  • 修回日期:2019-07-12 出版日期:2019-09-30 发布日期:2019-10-14
  • 作者简介:朱泓艺(1990- ),男,上海人,博士,上海宽带技术及应用工程研究中心助理研究员,主要研究方向为下一代无线通信技术、边缘计算及信息安全技术。|陆肖元(1975- ),男,上海人,教授级高级工程师,上海宽带技术及应用工程技术研究中心副主任、上海浦东临港智慧城市发展中心主任,主要研究方向为宽带网络与智慧城市应用等相关领域。|李毅(1965- ),男,浙江绍兴人,博士,博士生导师,上海宽带技术及应用工程研究中心主任,主要研究方向为宽带网络与大数据技术及应用等相关领域。
  • 基金资助:
    国家重点研发计划项目(2017YFB0803205);上海市科学技术委员会科研计划项目(18DZ1100503)

Research on distributed multi-access edge computing based on mimic defense theory

Hongyi ZHU(),Xiaoyuan LU,Yi LI   

  1. Shanghai Engineering Research Center for Broadband Technologies and Applications,Shanghai 200436,China
  • Revised:2019-07-12 Online:2019-09-30 Published:2019-10-14
  • Supported by:
    The Key Research and Development Program of China(2017YFB0803205);Science Research Program of Shanghai Scientific and Technology Committee(18DZ1100503)

摘要:

多接入边缘计算在网络边缘提供高性能的网络资源,但由于其位置管理分散,所以对安全性能要求较高。基于拟态防御原理提出了分布式多接入边缘计算的拟态防御架构,通过分割数据与校验填充,转发至多个边缘节点处理,并根据校验分析实现了多模裁决与动态调度的拟态防御机制。仿真结果表明,在增加时延成本的情况下,该架构可有效降低数据被篡改和被泄露的概率。提出了基于置信度与时延成本的边缘节点调度策略,提升了系统的效率与安全性能。

关键词: 多接入边缘计算, 业务编排, 拟态安全防御, 动态异构冗余

Abstract:

The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computing was proposed.By segmenting data,padding check data and processing data at multiple edge node,dynamic scheduling and decision-making functions according to checksum were implemented.The simulation results show that with the increase of delay cost,the data manipulation and leak rates can be reduced effectively by the proposed structure.The edge node scheduling strategy based on trust and cost is proposed to improve the efficiency and security of the system.

Key words: multi-access edge computing, task orchestration, mimic security defense, dynamic heterogeneous redundancy

中图分类号: 

No Suggested Reading articles found!