Research on distributed multi-access edge computing based on mimic defense theory

The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computi...

Full description

Saved in:
Bibliographic Details
Main Authors: Hongyi ZHU, Xiaoyuan LU, Yi LI
Format: Article
Language:zho
Published: China InfoCom Media Group 2019-09-01
Series:物联网学报
Subjects:
Online Access:http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2019.00122/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841531136558235648
author Hongyi ZHU
Xiaoyuan LU
Yi LI
author_facet Hongyi ZHU
Xiaoyuan LU
Yi LI
author_sort Hongyi ZHU
collection DOAJ
description The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computing was proposed.By segmenting data,padding check data and processing data at multiple edge node,dynamic scheduling and decision-making functions according to checksum were implemented.The simulation results show that with the increase of delay cost,the data manipulation and leak rates can be reduced effectively by the proposed structure.The edge node scheduling strategy based on trust and cost is proposed to improve the efficiency and security of the system.
format Article
id doaj-art-1655b83b7d1b422797fa5c476ecde0c5
institution Kabale University
issn 2096-3750
language zho
publishDate 2019-09-01
publisher China InfoCom Media Group
record_format Article
series 物联网学报
spelling doaj-art-1655b83b7d1b422797fa5c476ecde0c52025-01-15T02:52:37ZzhoChina InfoCom Media Group物联网学报2096-37502019-09-013768359644997Research on distributed multi-access edge computing based on mimic defense theoryHongyi ZHUXiaoyuan LUYi LIThe highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computing was proposed.By segmenting data,padding check data and processing data at multiple edge node,dynamic scheduling and decision-making functions according to checksum were implemented.The simulation results show that with the increase of delay cost,the data manipulation and leak rates can be reduced effectively by the proposed structure.The edge node scheduling strategy based on trust and cost is proposed to improve the efficiency and security of the system.http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2019.00122/multi-access edge computingtask orchestrationmimic security defensedynamic heterogeneous redundancy
spellingShingle Hongyi ZHU
Xiaoyuan LU
Yi LI
Research on distributed multi-access edge computing based on mimic defense theory
物联网学报
multi-access edge computing
task orchestration
mimic security defense
dynamic heterogeneous redundancy
title Research on distributed multi-access edge computing based on mimic defense theory
title_full Research on distributed multi-access edge computing based on mimic defense theory
title_fullStr Research on distributed multi-access edge computing based on mimic defense theory
title_full_unstemmed Research on distributed multi-access edge computing based on mimic defense theory
title_short Research on distributed multi-access edge computing based on mimic defense theory
title_sort research on distributed multi access edge computing based on mimic defense theory
topic multi-access edge computing
task orchestration
mimic security defense
dynamic heterogeneous redundancy
url http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2019.00122/
work_keys_str_mv AT hongyizhu researchondistributedmultiaccessedgecomputingbasedonmimicdefensetheory
AT xiaoyuanlu researchondistributedmultiaccessedgecomputingbasedonmimicdefensetheory
AT yili researchondistributedmultiaccessedgecomputingbasedonmimicdefensetheory