Edge Computing Security of Mobile Communication System Based on Computer Algorithms

被引:2
作者
Zhang, Jinna [1 ]
机构
[1] Zhengzhou Vocat Coll Finance & Taxat, Dept Informat Technol, Zhengzhou 450000, Henan, Peoples R China
关键词
Edge computing; mobile communication; computer algorithm; network security general appearance;
D O I
10.1142/S0218843024500023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the progress of information technology recently, mobile communication system edge computing (EC) has been widely used in all walks of life, but the traditional mobile communication system EC mode has security problems such as privacy disclosure, malicious tampering, and virus attacks. Computer algorithms has brought new vitality to EC in mobile communication systems. This paper analyzed the application of computer algorithm in EC mode of mobile communication system, and selected 20 users as the research object. This paper adopted traditional computing mode (such as cloud computing) and computer algorithm-based mobile communication system EC security research. This text compared the effects of two modes on security performance, data transmission efficiency, energy consumption, cost savings, and user satisfaction. The experimental results in this paper showed that the average security of EC mode of mobile communication system based on computer algorithm was 84%, and the average data transmission time was 4.8s. The energy consumption was 40%, and the cost savings and user satisfaction were 432,000 yuan and 13 points, respectively. Both were superior to the traditional edge counting mode. The EC mode of mobile communication system using computer algorithms can significantly improve the security of mobile communication, data transmission speed, cost savings, user satisfaction, and reduce energy consumption. This model has important significance and value for social development.
引用
收藏
页数:19
相关论文
共 16 条
[1]  
[Anonymous], 2022, IEEE Internet Things J, V9, P23472, DOI [10.1109/JIOT.2022.3200431.8, DOI 10.1109/JIOT.2022.3200431.8]
[2]  
[Anonymous], 2019, IEEE Internet Things J, V7, P2622, DOI [10.1109/JIOT.2019.2944007.12, DOI 10.1109/JIOT.2019.2944007.12]
[3]  
Butt M., 2020, Electronics9, P13
[4]   Making accurate object detection at the edge: review and new approach [J].
Huang, Zhenhua ;
Yang, Shunzhi ;
Zhou, MengChu ;
Gong, Zheng ;
Abusorrah, Abdullah ;
Lin, Chen ;
Huang, Zheng .
ARTIFICIAL INTELLIGENCE REVIEW, 2022, 55 (03) :2245-2274
[5]   Outdated Access Point Selection for Mobile Edge Computing With Cochannel Interference [J].
Lai, Xiazhi ;
Xia, Junjuan ;
Fan, Lisheng ;
Duong, Trung Q. ;
Nallanathan, Arumugam .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (07) :7445-7455
[6]   Resource and Trajectory Optimization for Secure Communications in Dual Unmanned Aerial Vehicle Mobile Edge Computing Systems [J].
Lu, Weidang ;
Ding, Yu ;
Gao, Yuan ;
Hu, Su ;
Wu, Yuan ;
Zhao, Nan ;
Gong, Yi .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (04) :2704-2713
[7]   Reconfigurable Intelligent Surface-Assisted Secure Mobile Edge Computing Networks [J].
Mao, Sun ;
Liu, Lei ;
Zhang, Ning ;
Dong, Mianxiong ;
Zhao, Jun ;
Wu, Jinsong ;
Leung, Victor C. M. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (06) :6647-6660
[8]   Vehicular Edge Computing: Architecture, Resource Management, Security, and Challenges [J].
Meneguette, Rodolfo ;
De Grande, Robson ;
Ueyama, Jo ;
Rocha Filho, Geraldo P. ;
Madeira, Edmundo .
ACM COMPUTING SURVEYS, 2023, 55 (01)
[9]   Survey on Multi-Access Edge Computing Security and Privacy [J].
Ranaweera, Pasika ;
Jurcut, Anca Delia ;
Liyanage, Madhusanka .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (02) :1078-1124
[10]   Opportunities for neuromorphic computing algorithms and applications [J].
Schuman, Catherine D. ;
Kulkarni, Shruti R. ;
Parsa, Maryam ;
Mitchell, J. Parker ;
Date, Prasanna ;
Kay, Bill .
NATURE COMPUTATIONAL SCIENCE, 2022, 2 (01) :10-19