{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T21:27:37Z","timestamp":1768253257517,"version":"3.49.0"},"reference-count":32,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:00:00Z","timestamp":1669680000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2020YFB1710901"],"award-info":[{"award-number":["2020YFB1710901"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Liaoning Province Higher Education Innovative Talent Support Program and the National Natural Science Foundation of China","award":["U1908214"],"award-info":[{"award-number":["U1908214"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2022,11,30]]},"abstract":"<jats:p>With the rapid development of edge computing, a new paradigm has formed for providing the nearest end service close to the data source. However, insufficient supply of resources makes edge computing devices vulnerable to attacks, especially sensitive to resource-consuming attacks. This article first designs system function module, aiming to deal with resource-consuming attacks based on the general three-layer architecture of edge computing. Combined with the mean field game, an anti-attack model is designed to transform the security defense problem of large terminal-edge-cloud devices into the mean field countermeasure problem, and the self-organizing neural network is used to approximate the mean field coupling equation. On this basis, a distributed AI-driven resource-consuming attack security defense (ARASD) algorithm is designed to obtain the optimal solution for devices security interaction, thereby improving the system\u2019s anti-attack ability. Finally, the effectiveness of the self-organizing neural network is verified through numerical simulation, and the parameters such as the number of initial terminal-edge-cloud devices and the number of iterations of different security defense algorithms are evaluated. The results show that the ARASD algorithm can achieve better resistance to resource-consuming attacks than other state-of-the-art algorithms in a large-scale edge computing architecture.<\/jats:p>","DOI":"10.1145\/3519303","type":"journal-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T11:34:20Z","timestamp":1657884860000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["AI-Based Mean Field Game against Resource-Consuming Attacks in Edge Computing"],"prefix":"10.1145","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9529-4317","authenticated-orcid":false,"given":"Kai","family":"Lin","sequence":"first","affiliation":[{"name":"Dalian University of Technology, Dalian, Liaoning, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2606-3301","authenticated-orcid":false,"given":"Jiayi","family":"Liu","sequence":"additional","affiliation":[{"name":"Liupanshui Normal University, Liupanshui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6921-7369","authenticated-orcid":false,"given":"Guangjie","family":"Han","sequence":"additional","affiliation":[{"name":"Hohai University, Nanjing, Jiangsu, China"}]}],"member":"320","published-online":{"date-parts":[[2022,11,29]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22203-0_38"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/CQR.2018.8445985"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102672"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2808190"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2413394"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2641959"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.043"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2019.04.007"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888037"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7471-1"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7526096"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700274"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.02.107"},{"key":"e_1_3_1_15_2","first-page":"128","volume-title":"Proceedings of the International Conference on Smart Grid Inspired Future Technologies","author":"Jiao Libin","year":"2020","unstructured":"Libin Jiao, Yonghua Huo, Ningling Ge, Zhongdi Ge, and Yang Yang. 2020. A resource consumption attack identification method based on data fusion. In Proceedings of the International Conference on Smart Grid Inspired Future Technologies. Springer, 128\u2013139."},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766492"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900299"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13235-015-0175-x"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2012.2214134"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11784-020-00806-4"},{"issue":"2","key":"e_1_3_1_21_2","first-page":"1498","article-title":"Forging a deep learning neural network intrusion detection framework to curb the distributed denial of service attack","volume":"11","author":"Ojugo Arnold Adimabua","year":"2021","unstructured":"Arnold Adimabua Ojugo and Rume Elizabeth Yoro. 2021. Forging a deep learning neural network intrusion detection framework to curb the distributed denial of service attack. International Journal of Electrical and Computer Engineering 11, 2 (2021), 1498.","journal-title":"International Journal of Electrical and Computer Engineering"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3188"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2018.8364046"},{"issue":"2","key":"e_1_3_1_24_2","first-page":"97","article-title":"Data security defense and algorithm for edge computing based on mean field game","volume":"2","author":"Qian Chengshan","year":"2020","unstructured":"Chengshan Qian, Xue Li, Ning Sun, and Yuqing Tian. 2020. Data security defense and algorithm for edge computing based on mean field game. Journal of Cybersecurity 2, 2 (2020), 97.","journal-title":"Journal of Cybersecurity"},{"key":"e_1_3_1_25_2","first-page":"1","article-title":"An optimized deep neural network based DoS attack detection in wireless video sensor network","author":"Ramesh S.","year":"2021","unstructured":"S. Ramesh, C. Yaashuwanth, K. Prathibanandhi, Adam Raja Basha, and T. Jayasankar. 2021. An optimized deep neural network based DoS attack detection in wireless video sensor network. Journal of Ambient Intelligence and Humanized Computing (2021), 1\u201314.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3350546.3352567"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102685"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2359333"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3098051"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/SSD.2016.7473659"},{"issue":"5","key":"e_1_3_1_31_2","first-page":"907","article-title":"Edge computing-An emerging computing model for the Internet of everything era","volume":"54","author":"Weisong Shi","year":"2017","unstructured":"Shi Weisong, Sun Hui, Cao Jie, Zhang Quan, and Liu Wei. 2017. Edge computing-An emerging computing model for the Internet of everything era. Journal of Computer Research and Development 54, 5 (2017), 907.","journal-title":"Journal of Computer Research and Development"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJADS.2018.090931"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9029540"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3519303","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3519303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:04Z","timestamp":1750186804000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3519303"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,29]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,11,30]]}},"alternative-id":["10.1145\/3519303"],"URL":"https:\/\/doi.org\/10.1145\/3519303","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,29]]},"assertion":[{"value":"2021-09-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-02-15","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}