[1] KHAN W Z,AHMED E,HAKAK S,et al. Edgecomputing:a survey[J]. Future Generation Computer Systems, 2019, 97:219-235. [2] 高志鹏,尧聪聪,肖楷乐. 移动边缘计算:架构、应用和挑战[J]. 中兴通讯技术,2019, 25(3):23-30.(GAO Z P,YAO C C, XIAO K L. Mobile edgecomputing:architecture,applications and challenges[J]. ZTE Communications,2019, 25(3):23-30.) [3] SHI W, DUSTDAR S. The promise of edgecomputing[J]. Computer,2016,49(5):78-81. [4] WANG T, ZHANG G, LIU A, et al. A secure IoT service architecture with an efficient balance dynamics based on cloud and edgecomputing[J]. IEEE Internet of Things Journal,2019,6(3):4831-4843. [5] LIAO R,WEN H,WU J,et al. Security enhancement for mobile edgecomputing through physical layer authentication[J]. IEEE Access,2019,7:116390-116401. [6] LIU J, XIAO L, LIU G, et al. Active authentication with reinforcement learning based on ambient radio signals[J]. Multimedia Tools and Applications,2017,76(3):3979-3998. [7] CONLEY W G, MILLER A J. Cognitive jamming game for dynamically countering ad hoc cognitive radio networks[C]//Proceedings of the 2013 IEEE Military Communications Conference. Piscataway:IEEE,2013:1176-1182. [8] 刘全, 翟建伟, 章宗长, 等. 深度强化学习综述[J]. 计算机学报, 2018,41(1):1-27. (LIU Q,ZHAI J W,ZHANG Z Z,et al. A survey on deep reinforcement learning[J]. Chinese Journal of Computers,2018,41(1):1-27.) [9] ROMAN R,LOPEZ J,MAMBO M. Mobile edgecomputing,fog et al.:a survey and analysis of security threats and challenges[J]. Future Generation Computer Systems,2018,78(Pt 2):680-698. [10] ATAT R, LIU L, CHEN H, et al. Enabling cyber-physicalcommunication in 5G cellular networks:challenges, spatial spectrum sensing,and cyber-security[J]. IET Cyber-Physical Systems Theory and Applications,2017,2(1):49-54. [11] IBRAHIM M H. Octopus:an edge-fog mutual authentication scheme[J]. International Journal of Network Security,2016,18(6):1089-1101. [12] BEN AMOR A,ABID M,MEDDEB A. A privacy-preserving authentication scheme in an edge-fog environment[C]//Proceedings of the 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications. Piscataway:IEEE,2017:1225-1231. [13] DAO N N,VU D N,LEE Y,et al. MAEC-X:DDoS prevention leveraging multi-access edgecomputing[C]//Proceedings of the 2018 International Conference on Information Networking. Piscataway:IEEE,2018:245-248. [14] KHALIL I,KHREISHAH A,AZEEM M. Consolidated identity management system for secure mobile cloudcomputing[J]. Computer Networks,2014,65:99-110. [15] XIAO L, GREENSTEIN L, MANDAYAM N B, et al. Fingerprints in the Ether:using the physical layer for wireless authentication[C]//Proceedings of the 2007 IEEE International Conference on Communications. Piscataway:IEEE,2007:4646-4651. [16] 李古月. 无线通信物理层安全理论与方法研究[D]. 南京:东南大学,2017:31-34. (LI G Y. Research on theory and method of wirelesscommunication physical layer security[D]. Nanjing:Southeast University,2017:31-34.) [17] LIU R,TRAPPE W. Securing Wireless Communications at the Physical Layer[M]. Boston:Springer,2010:241-242. [18] RSUTTON R S, BARTO A G. Reinforcement Learning:an Introduction[M]. Cambridge:MIT Press,1998:665-685. [19] KULKARNI P. Reinforcement and deep reinforcement machine learning[M]. Cham:Springer,2017:59-83. [20] MA Z,LEIJON A. Bayesian estimation of beta mixture models with variational inference[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence,2011,33(11):2160. [21] XIAO L,GREENSTEIN L J,MANDAYAM N B,et al. Channelbased spoofing detection in frequency-selective Rayleigh channels[J]. IEEE Transactions on Wireless Communications,2009,8(12):5948-5956. [22] XIAO L,GREENSTEIN L J,MANDAYAM N B,et al. Using the physical layer for wireless authentication in time-variant channels[J]. IEEE Transactions on Wireless Communications,2008,7(7):2571-2579. [23] TU S,WAQAS M,UR REHMAN S,et al. Security in fogcomputing:a novel technique to tackle an impersonation attack[J]. IEEE Access,2018,6:74993-75001. |