2021
DOI: 10.1016/j.pmcj.2021.101481
|View full text |Cite
|
Sign up to set email alerts
|

Secure D2D caching framework inspired on trust management and blockchain for Mobile Edge Caching

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Recently, mobile edge computing (MEC) has created a remarkable achievement for the cellular communication industry and has simplified humans' lifestyle [1]. With the near user resources of computation and storage, MEC can provide a low-delay service for resourceconstrained user terminals (UTs) on the internet of things (IoT) [2]. However, with the increase of the number of UTs and emerging smart applications, wireless communication networks face a serious challenge.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, mobile edge computing (MEC) has created a remarkable achievement for the cellular communication industry and has simplified humans' lifestyle [1]. With the near user resources of computation and storage, MEC can provide a low-delay service for resourceconstrained user terminals (UTs) on the internet of things (IoT) [2]. However, with the increase of the number of UTs and emerging smart applications, wireless communication networks face a serious challenge.…”
Section: Introductionmentioning
confidence: 99%
“…However, this situation creates a bottleneck threat due to continuous growth in the process and may cause delays and malfunctions as a result of blockages in network traffic [6]. With these developments, many problem areas that need to be developed in terms of efficiency, security requirements, resource usage and user security have emerged [3,5]. Many IoT devices used to gather information from the environment do not have enough resources to deal with malicious cyber-attacks.…”
Section: Introductionmentioning
confidence: 99%