2019
DOI: 10.1109/access.2019.2947306
|View full text |Cite
|
Sign up to set email alerts
|

A Trust-Aware Task Offloading Framework in Mobile Edge Computing

Abstract: Task offloading in Mobile Edge Computing (MEC) is a solution to augment resource-limited mobile devices' capabilities by migrating tasks to the edge of the network (i.e., edge servers and idle devices). At present, a lot of work is focused on optimizing policies to reduce latency or energy consumption for users. However, they mostly ignore that services are not necessarily trustworthy because the resource providers are complex, dynamic, and unreliable. The trustworthiness of a service in our paper mainly inclu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 49 publications
0
11
0
Order By: Relevance
“…Calculating the authentication time involves considering the time the UE takes to initiate the authentication process, the time taken for the ZTMM to process the request, and the time taken for the UE to receive the authentication response. Here is a step‐by‐step approach for calculating authentication time 12,36 : Start time measurement . Begin measuring the authentication time when the UE initiates the authentication request. Request transmission time .…”
Section: Trust‐aware Authentication and Task Load Balancing In Mecmentioning
confidence: 99%
“…Calculating the authentication time involves considering the time the UE takes to initiate the authentication process, the time taken for the ZTMM to process the request, and the time taken for the UE to receive the authentication response. Here is a step‐by‐step approach for calculating authentication time 12,36 : Start time measurement . Begin measuring the authentication time when the UE initiates the authentication request. Request transmission time .…”
Section: Trust‐aware Authentication and Task Load Balancing In Mecmentioning
confidence: 99%
“…In vehicle and cellular networks the task offloading problem (which we focus on in this article) is referred to as Multi-access Edge Computing (MEC) (previously Mobile Edge Computing) [47]. A variety of solutions have been proposed for trust-based offloading in MEC systems, typically involving machine learning approaches [53,80], linear programming (LP) [20], or game theoretic approaches [63]. However, these solutions are typically unsuitable for use in resource-constrained systems.…”
Section: Trust Assessmentmentioning
confidence: 99%
“…One approach is to frame trust evaluation as a classification problem. In [17] support vector machines were trained offline and used to facilitate behavioural trust classification. A downside is that a (potentially) large quality of labelled data may needed to train a model, which may not be available or representative of behaviour that will occur.…”
Section: B Task Offloadingmentioning
confidence: 99%
“…Different works have focused on optimising task offloading for different constraints such as bandwidth [19], latency [20], energy [22] and privacy [17]. Some of these works have framed offloading as a trust evaluation task, with different definitions of what a trustor is evaluating in a trustee.…”
Section: B Task Offloadingmentioning
confidence: 99%