Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing

被引:4
|
作者
Yuan, Jie [1 ]
Li, Erxia [2 ]
Kang, Chaoqun [2 ]
Chang, Fangyuan [2 ]
Li, Xiaoyong [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Key Lab Trustworthy Distributed Comp & Serv, Minist Educ, Beijing 100876, Peoples R China
[2] China Elect Power Res Inst, Beijing 100192, Peoples R China
关键词
mobile edge computing; trusted cooperative mechanism; D2D; social trust; reputation; authentication techniques; SECURITY; CLOUD; INTERNET; THINGS; ARCHITECTURE; MIGRATION; NETWORKS; PRIVACY; SCHEME;
D O I
10.3390/info10080259
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile edge computing (MEC) effectively integrates wireless network and Internet technologies and adds computing, storage, and processing functions to the edge of cellular networks. This new network architecture model can deliver services directly from the cloud to the very edge of the network while providing the best efficiency in mobile networks. However, due to the dynamic, open, and collaborative nature of MEC network environments, network security issues have become increasingly complex. Devices cannot easily ensure obtaining satisfactory and safe services because of the numerous, dynamic, and collaborative character of MEC devices and the lack of trust between devices. The trusted cooperative mechanism can help solve this problem. In this paper, we analyze the MEC network structure and device-to-device (D2D) trusted cooperative mechanism and their challenging issues and then discuss and compare different ways to establish the D2D trusted cooperative relationship in MEC, such as social trust, reputation, authentication techniques, and intrusion detection. All these ways focus on enhancing the efficiency, stability, and security of MEC services in presenting trustworthy services.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Performance Analysis for D2D-Enabled Cellular Networks With Mobile Edge Computing
    Hu, Han
    Zong, Pengfei
    Wang, Hong
    Zhu, Hongbo
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [32] Chaotic Deep Network for Mobile D2D Communication
    Li, Lixiang
    Chen, Yixin
    Peng, Haipeng
    Yang, Yixian
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (10): : 8078 - 8096
  • [33] An optimized architecture and algorithm for resource allocation in D2D aided fog computing
    Ranjan, Himanshuram
    Dwivedi, Atul Kumar
    Prakasam, P.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (02) : 1294 - 1310
  • [34] Secure Beamforming Design for SWIPT in Cooperative D2D Communications
    Jiang, Li
    Qin, Cheng
    Zhang, Xixi
    Tian, Hui
    CHINA COMMUNICATIONS, 2017, 14 (01) : 20 - 33
  • [35] Towards Bootstrapping Trust in D2D using PGP and Reputation Mechanism
    Usman, Muhammad
    Asghar, Muhammad Rizwan
    Ansari, Imran Shafique
    Granelli, Fabrizio
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [36] A Power Allocation Scheme for MIMO-NOMA and D2D Vehicular Edge Computing Based on Decentralized DRL
    Long, Dunxing
    Wu, Qiong
    Fan, Qiang
    Fan, Pingyi
    Li, Zhengquan
    Fan, Jing
    SENSORS, 2023, 23 (07)
  • [37] On Joint Cooperative Relaying, Resource Allocation, and Scheduling for Mobile Edge Computing Networks
    Biswas, Nilanjan
    Wang, Zijian
    Vandendorpe, Luc
    Mirghasemi, Hamed
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (09) : 5882 - 5897
  • [38] A novel task offloading algorithm based on an integrated trust mechanism in mobile edge computing
    Tong, Zhao
    Ye, Feng
    Mei, Jing
    Liu, Bilan
    Li, Keqin
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 169 : 185 - 198
  • [39] A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party
    Mishra, Dheerendra
    Dharminder, Dharminder
    Yadav, Preeti
    Rao, Y. Sreenivasa
    Vijayakumar, Pandi
    Kumar, Neeraj
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [40] SDR Implementation of a D2D Security Cryptographic Mechanism
    Balan, Titus N.
    Balan, Alexandra C.
    Sandu, Florin D.
    IEEE ACCESS, 2019, 7 : 38847 - 38855