2023
DOI: 10.1002/cpe.7956
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing trust and security in IoT computing offloading through game theory and blockchain‐based control strategy

Dongzhi Cao,
Peng Liang,
Tongjuan Wu
et al.

Abstract: SummaryCollaboration between IoT end‐devices and edge servers or idle devices enables offloading of computational tasks, providing an effective solution to address inherent limitations in computational resources, storage capacity, and energy efficiency. However, IoT network openness introduces security challenges, such as privacy breaches, data security, and “free‐riding” attack. Securing computational offloading is crucial for service quality and reliability. In this article, we introduce a comprehensive appr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 36 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?