2022
DOI: 10.1109/jiot.2021.3139222
|View full text |Cite
|
Sign up to set email alerts
|

Authentication Security Level and Resource Optimization of Computation Offloading in Edge Computing Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…In the EC environment, CO services are intended to serve IoT applications that demand considerable processing power and must function with minimal latency. Creating anonymous mutual authentication between many IoT devices and EdSrs may be challenging 159 and various authentication techniques are compared in Table 13. CO services seek to address this issue by securely shifting the computational tasks from IoT devices to EdSrs.…”
Section: Authentication and Traceability Based Offloading In Ecmentioning
confidence: 99%
See 1 more Smart Citation
“…In the EC environment, CO services are intended to serve IoT applications that demand considerable processing power and must function with minimal latency. Creating anonymous mutual authentication between many IoT devices and EdSrs may be challenging 159 and various authentication techniques are compared in Table 13. CO services seek to address this issue by securely shifting the computational tasks from IoT devices to EdSrs.…”
Section: Authentication and Traceability Based Offloading In Ecmentioning
confidence: 99%
“…The authors proposed a lightweight anonymous mutual authentication (LAMANCO) scheme for smart cards. Xiao et al 159 explored hash algorithms used on the EdSrs for offloading decisions to optimize the authentication security level of the Merkle tree signature. To optimize the time delay and authentication security level simultaneously, they proposed an optimization problem to jointly optimize the offloading decision, EC frequency, and amount of data blocks.…”
Section: Authentication and Traceability Based Offloading In Ecmentioning
confidence: 99%