Research on distributed multi-access edge computing based on mimic defense theory
The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computi...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
China InfoCom Media Group
2019-09-01
|
Series: | 物联网学报 |
Subjects: | |
Online Access: | http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2019.00122/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841531136558235648 |
---|---|
author | Hongyi ZHU Xiaoyuan LU Yi LI |
author_facet | Hongyi ZHU Xiaoyuan LU Yi LI |
author_sort | Hongyi ZHU |
collection | DOAJ |
description | The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computing was proposed.By segmenting data,padding check data and processing data at multiple edge node,dynamic scheduling and decision-making functions according to checksum were implemented.The simulation results show that with the increase of delay cost,the data manipulation and leak rates can be reduced effectively by the proposed structure.The edge node scheduling strategy based on trust and cost is proposed to improve the efficiency and security of the system. |
format | Article |
id | doaj-art-1655b83b7d1b422797fa5c476ecde0c5 |
institution | Kabale University |
issn | 2096-3750 |
language | zho |
publishDate | 2019-09-01 |
publisher | China InfoCom Media Group |
record_format | Article |
series | 物联网学报 |
spelling | doaj-art-1655b83b7d1b422797fa5c476ecde0c52025-01-15T02:52:37ZzhoChina InfoCom Media Group物联网学报2096-37502019-09-013768359644997Research on distributed multi-access edge computing based on mimic defense theoryHongyi ZHUXiaoyuan LUYi LIThe highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computing was proposed.By segmenting data,padding check data and processing data at multiple edge node,dynamic scheduling and decision-making functions according to checksum were implemented.The simulation results show that with the increase of delay cost,the data manipulation and leak rates can be reduced effectively by the proposed structure.The edge node scheduling strategy based on trust and cost is proposed to improve the efficiency and security of the system.http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2019.00122/multi-access edge computingtask orchestrationmimic security defensedynamic heterogeneous redundancy |
spellingShingle | Hongyi ZHU Xiaoyuan LU Yi LI Research on distributed multi-access edge computing based on mimic defense theory 物联网学报 multi-access edge computing task orchestration mimic security defense dynamic heterogeneous redundancy |
title | Research on distributed multi-access edge computing based on mimic defense theory |
title_full | Research on distributed multi-access edge computing based on mimic defense theory |
title_fullStr | Research on distributed multi-access edge computing based on mimic defense theory |
title_full_unstemmed | Research on distributed multi-access edge computing based on mimic defense theory |
title_short | Research on distributed multi-access edge computing based on mimic defense theory |
title_sort | research on distributed multi access edge computing based on mimic defense theory |
topic | multi-access edge computing task orchestration mimic security defense dynamic heterogeneous redundancy |
url | http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2019.00122/ |
work_keys_str_mv | AT hongyizhu researchondistributedmultiaccessedgecomputingbasedonmimicdefensetheory AT xiaoyuanlu researchondistributedmultiaccessedgecomputingbasedonmimicdefensetheory AT yili researchondistributedmultiaccessedgecomputingbasedonmimicdefensetheory |