2019
DOI: 10.3390/info10080259
|View full text |Cite
|
Sign up to set email alerts
|

Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing

Abstract: Mobile edge computing (MEC) effectively integrates wireless network and Internet technologies and adds computing, storage, and processing functions to the edge of cellular networks. This new network architecture model can deliver services directly from the cloud to the very edge of the network while providing the best efficiency in mobile networks. However, due to the dynamic, open, and collaborative nature of MEC network environments, network security issues have become increasingly complex. Devices cannot ea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 53 publications
0
3
0
Order By: Relevance
“…The result show that D2D depend on the 5G network resources to guarantee the required capacity, high reliability, low latency, throughput, resiliency, and security in sending and receiving data among devices. A review of the D2D reliable cooperative method in mobile system is summarized in [120]. In this paper, mobile network structure and D2D reliable cooperative structure and their challenging questions and then discourse and compare distinct behaviors to launch the D2D reliable cooperative affiliation in mobile network.…”
Section: Enhancing Reliabilitymentioning
confidence: 99%
“…The result show that D2D depend on the 5G network resources to guarantee the required capacity, high reliability, low latency, throughput, resiliency, and security in sending and receiving data among devices. A review of the D2D reliable cooperative method in mobile system is summarized in [120]. In this paper, mobile network structure and D2D reliable cooperative structure and their challenging questions and then discourse and compare distinct behaviors to launch the D2D reliable cooperative affiliation in mobile network.…”
Section: Enhancing Reliabilitymentioning
confidence: 99%
“…The edge layer contains a large number of high-frequency interactive devices, and the number of nodes and trust information is growing exponentially. While edge layer devices are mostly resource-constrained devices, massive trust information easily leads to information overload, causing node overload and early decline [12], [13]. A trusted and lightweight distributed trust evaluation mechanism is urgently needed.…”
Section: Introductionmentioning
confidence: 99%
“…The authors wish to make the following corrections to this paper [1]. In "Funding": This work was supported in part by the project "Research on Security Architecture for Next Generation Distribution Automation System of State Grid Corporation of China".…”
mentioning
confidence: 99%