Abstract
Mobile edge computing (MEC) effectively integrates wireless network and Internet technologies and adds computing, storage, and processing functions to the edge of cellular networks. This new network architecture model can deliver services directly from the cloud to the very edge of the network while providing the best efficiency in mobile networks. However, due to the dynamic, open, and collaborative nature of MEC network environments, network security issues have become increasingly complex. Devices cannot easily ensure obtaining satisfactory and safe services because of the numerous, dynamic, and collaborative character of MEC devices and the lack of trust between devices. The trusted cooperative mechanism can help solve this problem. In this paper, we analyze the MEC network structure and device-to-device (D2D) trusted cooperative mechanism and their challenging issues and then discuss and compare different ways to establish the D2D trusted cooperative relationship in MEC, such as social trust, reputation, authentication techniques, and intrusion detection. All these ways focus on enhancing the efficiency, stability, and security of MEC services in presenting trustworthy services.
Highlights
Mobile edge computing (MEC) is a new computing model for service providers challenged to meet large-scale user demands for improved service speed [1,2,3,4]
We present a review of the D2D trusted cooperative mechanism developed for MEC
In the semi-centralized trusted cooperative mechanism, edge devices perform under the control of base stations (BSs) or edge servers, which can respond to the information collection, computing, and feedback without the participation of cloud servers
Summary
Mobile edge computing (MEC) is a new computing model for service providers challenged to meet large-scale user demands for improved service speed [1,2,3,4]. In large-scale MEC environments, the network ecological environment comprises different building blocks, such as cloud data centers, MEC platforms, service providers, and edge devices with diverse, dynamic, mobile, and cooperative behavior. Compared with other network computing modes, the security problem in MEC is more complex, and large-scale use of mobile devices will bring new security challenges and threats to the deployment of edge cloud servers. The trusted cooperative mechanism is based on the concept of the frequent interaction between edge devices and edge servers and the frequent interaction between edge devices It evaluates the behavior and service reliability of collaborative entities by dynamically acquiring service behavior, to solve the corresponding access control problems and ensure the security of all edge nodes during authentication, authorization, and service collaboration.
Published Version (
Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have