Solving security problems in MEC systems
Author | Zheng, Xiao |
Author | Li, Mingchu |
Author | Chen, Yuanfang |
Author | Guizani, Mohsen |
Author | Liu, Jia |
Author | Tahir, Muhammad |
Available date | 2020-06-02T08:17:31Z |
Publication Date | 2019 |
Publication Name | 2019 15th International Wireless Communications and Mobile Computing Conference, IWCMC 2019 |
Resource | Scopus |
Abstract | We propose an algorithm for constructing efficient security strategies in the mobile edge computing (MEC), where the protected targets are nodes connected to the MEC and the mobile users (MUs) are agents capable of preventing undesirable activities on the nodes. The algorithm is designed based on the synthetic principles of a specific set of strategies, and it can quickly construct suboptimal solutions even if the number of targets reaches hundreds of millions. - 2019 IEEE. |
Sponsor | ACKNOWLEDGMENT The paper is supported by National Nature Science of foundation of China under grant No.s: 61572095, 61877007. |
Language | en |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Subject | Agents capable Mobile edge computing(MEC) Mobile users (MUs) Security strategies Suboptimal Synthetic principles |
Type | Conference |
Pagination | 1847-1852 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Computer Science & Engineering [2426 items ]