Secure Edge Computing in IoT via Online Learning

Bingcong Li, Tianyi Chen, Xin Wang, Georgios B Giannakis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations


To accommodate heterogeneous tasks in Internet of Things (IoT), a new communication and computing paradigm termed mobile edge computing emerges, extending the computing service from the cloud to edge, but at the same time exposing new challenges on security. The present paper studies online security-aware edge computing under jamming attacks. Leveraging online learning tools, we develop SAVE-S algorithm that is tailored for the stochastic jamming. Without utilizing extra resources such as spectrum and transmission power to evade jamming attacks, SAVE-S can select the most reliable server to offload computing tasks with minimal privacy and security concerns. It is analytically established that without any prior knowledge of future jamming information and server security risks, the proposed scheme can achieve mathrm{O}(sqrt{T}) regret. Information sharing among devices can accelerate the security-aware computing tasks. Incorporating the information shared by other devices, SAVE-S has significant improvements on the sublinear regret, which is guaranteed by what we term value of cooperation. The effectiveness of proposed schemes are tested on both synthetic and real datasets.

Original languageEnglish (US)
Title of host publicationConference Record of the 52nd Asilomar Conference on Signals, Systems and Computers, ACSSC 2018
EditorsMichael B. Matthews
PublisherIEEE Computer Society
Number of pages5
ISBN (Electronic)9781538692189
StatePublished - Feb 19 2019
Event52nd Asilomar Conference on Signals, Systems and Computers, ACSSC 2018 - Pacific Grove, United States
Duration: Oct 28 2018Oct 31 2018

Publication series

NameConference Record - Asilomar Conference on Signals, Systems and Computers
ISSN (Print)1058-6393


Conference52nd Asilomar Conference on Signals, Systems and Computers, ACSSC 2018
Country/TerritoryUnited States
CityPacific Grove

Bibliographical note

Publisher Copyright:
© 2018 IEEE.


  • Cyber security
  • jamming attack
  • mobile edge computing
  • multi-armed bandit
  • online learning


Dive into the research topics of 'Secure Edge Computing in IoT via Online Learning'. Together they form a unique fingerprint.

Cite this