Show simple item record

AuthorZheng, Xiao
AuthorLi, Mingchu
AuthorChen, Yuanfang
AuthorGuizani, Mohsen
AuthorLiu, Jia
AuthorTahir, Muhammad
Available date2020-06-02T08:17:31Z
Publication Date2019
Publication Name2019 15th International Wireless Communications and Mobile Computing Conference, IWCMC 2019
ResourceScopus
URIhttp://dx.doi.org/10.1109/IWCMC.2019.8766752
URIhttp://hdl.handle.net/10576/15005
AbstractWe propose an algorithm for constructing efficient security strategies in the mobile edge computing (MEC), where the protected targets are nodes connected to the MEC and the mobile users (MUs) are agents capable of preventing undesirable activities on the nodes. The algorithm is designed based on the synthetic principles of a specific set of strategies, and it can quickly construct suboptimal solutions even if the number of targets reaches hundreds of millions. - 2019 IEEE.
SponsorACKNOWLEDGMENT The paper is supported by National Nature Science of foundation of China under grant No.s: 61572095, 61877007.
Languageen
PublisherInstitute of Electrical and Electronics Engineers Inc.
SubjectAgents capable
Mobile edge computing(MEC)
Mobile users (MUs)
Security strategies
Suboptimal
Synthetic principles
TitleSolving security problems in MEC systems
TypeConference Paper
Pagination1847-1852


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record