检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Boran Yang Dapeng Wu Ruyan Wang Zhigang Yang Yu Yang
机构地区:[1]School of Communication and Information Engineering,Chongqing University of Posts and Telecommunications,Chongqing,400065,China [2]Advanced Network and Intelligent Connection Technology Key Laboratory of Chongqing Education Commission of China,Chongqing,400065,China [3]Chongqing Key Laboratory of Ubiquitous Sensing and Networking,Chongqing,400065,China
出 处:《Digital Communications and Networks》2024年第5期1365-1374,共10页数字通信与网络(英文版)
基 金:supported by National Natural Science Foundation of China(61901071,61871062,61771082,U20A20157);Science and Natural Science Foundation of Chongqing,China(cstc2020jcyjzdxmX0024);University Innovation Research Group of Chongqing(CXQT20017);Youth Innovation Group Support Program of ICE Discipline of CQUPT(SCIE-QN-2022-04);Science and Technology ResearchProgram of Chongqing Municipal Education Commission(KJQN202000626);Program for Innovation Team Building at Institutions of Higher Education in Chongqing(CXTDX201601020)。
摘 要:The phenomenal popularity of smart mobile computing hardware is enabling pervasive edge intelligence and ushering us into a digital twin era.However,the natural barrier between edge equipment owned by different interested parties poses unique challenges for cross-domain trust management.In addition,the openness of radio access and the accessibility of edge services render edge intelligence systems vulnerable and put sensitive user data in jeopardy.This paper presents an intrusion protection mechanism for edge trust transfer to address the inter-edge trust management issue and the conundrum of detecting indistinguishable malevolent nodes launching weak attacks.First,an inter-edge reputation transfer framework is established to leverage the trust quality of different edges to retain the accumulated trust histories of users when they roam in multi-edge environments structurally.Second,a fine-grained intrusion protection system is proposed to reduce the negative impact of attacks on user interactions and improve the overall trust quality and system security of edge intelligence services.The experimental results validate the effectiveness and superior performance of the proposed intrusion protection for edge trust transfer in securing,enhancing,and consolidating edge intelligence services.
关 键 词:Edge computing Cross-domain trust management Trust transfer Intrusion protection
分 类 号:TN9[电子电信—信息与通信工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.33