Abstract: The rapid proliferation of Edge Artificial Intelligence (Edge AI) has introduced significant cybersecurity challenges due to decentralized computation, limited resource constraints, and increased attack surfaces. Traditional security mechanisms often fall short in addressing dynamic and adversarial environments where intelligent attackers continuously adapt their strategies. This paper explores the application of game-theoretic algorithms to enhance cybersecurity in Edge AI ecosystems by modeling interactions between defenders (e.g., edge nodes, gateways) and attackers as strategic games......
Key Word: Edge Computing, Cybersecurity, Edge A, Threat Detection, Threat Mitigation, Intrusion Detection, Adversarial Modeling, Security Framework, Autonomous Systems Security, AI-driven Security.
[1]. Bu, K., Yu, F. R., Liang, X., & Liu, Q. (2019). A game-theoretic approach to secure and resilient resource allocation in fog computing. IEEE Transactions on Network and Service Management, 16(4), 1520–1533.
[2]. Cheng, R., Liu, F., Zhang, Z., & Xu, M. (2020). Game-theoretic approaches for securing edge computing: A survey. IEEE Internet of Things Journal, 7(7), 5828–5842.
[3]. Chen, M., Zhang, Y., & Li, Y. (2019). Intelligent offloading for mobile edge computing in 5G heterogeneous networks: A deep reinforcement learning approach. IEEE Transactions on Wireless Communications, 18(11), 5304–5317.
[4]. Elazab, A., Abd El-Latif, A. A., & El-Samie, F. E. A. (2019). A game-theoretic model for securing data transmission in IoT networks. Journal of Network and Computer Applications, 126, 68–75.
[5]. Fung, C., Zhang, Z., & Boutaba, R. (2021). A comprehensive survey on network virtualization attacks and defenses. IEEE Communications Surveys & Tutorials, 23(2), 961–996.