• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Yin, Mingxi (Yin, Mingxi.) | Yu, Jinliang (Yu, Jinliang.) | Tu, Shanshan (Tu, Shanshan.) | Waqas, Muhammad (Waqas, Muhammad.) | Rehman, Sadaqat Ur (Rehman, Sadaqat Ur.) | Abbas, Ghulam (Abbas, Ghulam.) | Abbas, Ziaul Haq (Abbas, Ziaul Haq.)

收录:

EI

摘要:

With the development of the Internet of Things technology and the advent of the 5G era, cloud computing is difficult to meet the requirements of low latency, high reliability, and data security for various application services. The fog computing model newly proposed by researchers in recent years can increase the task processing and data analysis capabilities of network edge devices, so it can reduce the computing load of cloud computing devices and improve the efficiency of data operations. Although fog computing can largely solve existing cloud computing problems, secure access and privacy protection are still a very important and urgent problem to be solved. Aiming at the problem of selecting a relay node to generate a security key under the fog computing model under the fog computing model, this paper proposes a secure relay node selection method based on game theory. In this paper, a fog computing model based on social relationships is constructed. Under this model, a secure relay node selection method based on game theory is designed to realize the selection of relay nodes when a communication link generates a security key. Finally, this paper analyzes the selection efficiency from the two dimensions of total equipment and dynamic changes of terminal equipment. Simulation results show that the method proposed in this paper can quickly select secure relay nodes in the social connection-based fog computing model. © 2020, Springer Nature Switzerland AG.

关键词:

5G mobile communication systems Artificial intelligence Computation theory Computer games Data privacy Efficiency Fog Fog computing Game theory Network security

作者机构:

  • [ 1 ] [Yin, Mingxi]Beijing Key Laboratory of Trusted Computing, School of Computing, Beijing University of Technology, Beijing; 100124, China
  • [ 2 ] [Yu, Jinliang]Beijing Key Laboratory of Trusted Computing, School of Computing, Beijing University of Technology, Beijing; 100124, China
  • [ 3 ] [Tu, Shanshan]Beijing Key Laboratory of Trusted Computing, School of Computing, Beijing University of Technology, Beijing; 100124, China
  • [ 4 ] [Waqas, Muhammad]Beijing Key Laboratory of Trusted Computing, School of Computing, Beijing University of Technology, Beijing; 100124, China
  • [ 5 ] [Waqas, Muhammad]Telecommunications and Networking (TelCon) Research Lab, Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, Topi; KPK; 23460, Pakistan
  • [ 6 ] [Rehman, Sadaqat Ur]Beijing Key Laboratory of Trusted Computing, School of Computing, Beijing University of Technology, Beijing; 100124, China
  • [ 7 ] [Rehman, Sadaqat Ur]College of Science and Engineering, Hammad Bin Khalifa University, Doha, Qatar
  • [ 8 ] [Abbas, Ghulam]Telecommunications and Networking (TelCon) Research Lab, Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, Topi; KPK; 23460, Pakistan
  • [ 9 ] [Abbas, Ziaul Haq]Telecommunications and Networking (TelCon) Research Lab, Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, Topi; KPK; 23460, Pakistan

通讯作者信息:

  • [tu, shanshan]beijing key laboratory of trusted computing, school of computing, beijing university of technology, beijing; 100124, china

电子邮件地址:

查看成果更多字段

相关关键词:

来源 :

ISSN: 0302-9743

年份: 2020

卷: 12239 LNCS

页码: 173-183

语种: 英文

被引次数:

WoS核心集被引频次: 0

SCOPUS被引频次: 1

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 3

归属院系:

在线人数/总访问数:183/3605565
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司