scispace - formally typeset
Open AccessJournal ArticleDOI

Deep Learning Enabled Data Offloading With Cyber Attack Detection Model in Mobile Edge Computing Systems

Reads0
Chats0
TLDR
A new DL based traffic prediction with a data offloading mechanism with cyber-attack detection (DLTPDO-CD) technique is presented, stating the superiority of the presented model over the compared methods under different dimensions.
Abstract
Mobile edge computing (MEC) becomes popular as it offers cloud services and functionalities to the edge devices, to enhance the quality of service (QoS) of end-users by offloading their computationally intensive tasks. At the same time, the rise in the number of internet of things (IoT) objectives poses considerable cybersecurity issues owing to the latest rise in the existence of attacks. Presently, the development of deep learning and hardware technologies offers a way to detect the present traffic condition, data offloading, and cyber-attacks in edge networks. The utilization of DL models finds helpful in several domains in which the MEC provides the decisive beneficiary of the approach for traffic prediction and attack detection since a large quantity of data generated by IoT devices enables deep models to learn better than shallow approaches. In this view, this paper presents a new DL based traffic prediction with a data offloading mechanism with cyber-attack detection (DLTPDO-CD) technique. The proposed model involves three major processes traffic prediction, data offloading, and attack detection. Initially, bidirectional long short term memory (BiLSTM) based traffic prediction to enable the proficient data offloading process. Then, the adaptive sampling cross entropy (ASCE) technique is executed to maximize the network throughput by making decisions related to offloading users to the WiFi system. Finally, a deep belief network (DBN) optimized by a barnacles mating optimizer (BMO) algorithm called BMO-DBN is applied as a detection tool for cyberattacks in MEC. Extensive simulation is carried out to ensure the proficient performance of the DLTPDO-CD model. The experimental outcome stated the superiority of the presented model over the compared methods under different dimensions.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques

TL;DR: In this paper, a cognitive machine learning assisted attack detection framework has been proposed to share healthcare data securely, which is based on a patient-centric design that safeguards the information on trusted devices like the end-users mobile phones and end-user control data sharing access.
Journal ArticleDOI

Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach

TL;DR: In this paper , the authors proposed a system of deep hierarchical stacked neural networks for timely and accurate detection of malicious activity that leads to alteration of meta-information or payload of the dataflow between the IoT gateway, edge and core clouds.
Journal ArticleDOI

Artificial Intelligence Based Data Offloading Technique for Secure MEC Systems

TL;DR: In this paper , an artificial intelligence with metaheuristic based data offloading technique for secure mobile edge computing (AIMDO-SMEC) systems was introduced. But, the authors did not consider the cyber-attacks in their work.
Book ChapterDOI

Class imbalance data handling with deep learning–based ubiquitous healthcare monitoring system using wearable devices

TL;DR: Wang et al. as mentioned in this paper developed a new class imbalance data handling (CIH) with optimal deep belief network (ODBN) model, named CIH-ODBN for ubiquitous healthcare monitoring system.
References
More filters
Journal ArticleDOI

Mobile Edge Computing: A Survey on Architecture and Computation Offloading

TL;DR: This paper describes major use cases and reference scenarios where the mobile edge computing (MEC) is applicable and surveys existing concepts integrating MEC functionalities to the mobile networks and discusses current advancement in standardization of the MEC.
Journal ArticleDOI

Mobile Edge Computing: A Survey on Architecture and Computation Offloading

TL;DR: In this paper, the authors present a survey of the research on computation offloading in mobile edge computing (MEC), focusing on user-oriented use cases and reference scenarios where the MEC is applicable.
Journal ArticleDOI

Joint Offloading and Computing Optimization in Wireless Powered Mobile-Edge Computing Systems

TL;DR: In this paper, the authors proposed a unified MEC-WPT design by considering a wireless powered multiuser MEC system, where a multiantenna access point (AP) integrated with an MEC server broadcasts wireless power to charge multiple users and each user node relies on the harvested energy to execute computation tasks.
Journal ArticleDOI

Mobile data offloading: how much can WiFi deliver?

TL;DR: A trace-driven simulation using the acquired whole-day traces indicates that WiFi already offloads about 65% of the total mobile data traffic and saves 55% of battery power without using any delayed transmission.
Proceedings ArticleDOI

The Performance of LSTM and BiLSTM in Forecasting Time Series

TL;DR: The results show that additional training of data and thus BiLSTM-based modeling offers better predictions than regular LSTm-based models.
Related Papers (5)