A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit <a rel="external noopener" href="https://pdfs.semanticscholar.org/c003/965b000b7306d4d484e3c9bf25130e26b615.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
<i title="MDPI AG">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dmr4kpn2yreovpdxpdiqtjcrnu" style="color: black;">Information</a>
Mobile edge computing (MEC) effectively integrates wireless network and Internet technologies and adds computing, storage, and processing functions to the edge of cellular networks. This new network architecture model can deliver services directly from the cloud to the very edge of the network while providing the best efficiency in mobile networks. However, due to the dynamic, open, and collaborative nature of MEC network environments, network security issues have become increasingly complex.<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/info10080259">doi:10.3390/info10080259</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zu5n2i3enjczxbbkhr2x3ptg54">fatcat:zu5n2i3enjczxbbkhr2x3ptg54</a> </span>
more »... vices cannot easily ensure obtaining satisfactory and safe services because of the numerous, dynamic, and collaborative character of MEC devices and the lack of trust between devices. The trusted cooperative mechanism can help solve this problem. In this paper, we analyze the MEC network structure and device-to-device (D2D) trusted cooperative mechanism and their challenging issues and then discuss and compare different ways to establish the D2D trusted cooperative relationship in MEC, such as social trust, reputation, authentication techniques, and intrusion detection. All these ways focus on enhancing the efficiency, stability, and security of MEC services in presenting trustworthy services.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200226203307/https://pdfs.semanticscholar.org/c003/965b000b7306d4d484e3c9bf25130e26b615.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c0/03/c003965b000b7306d4d484e3c9bf25130e26b615.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/info10080259"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>