A security integration model for private data of intelligent mobile communication based on edge computing

X Chen - Computer Communications, 2020 - Elsevier
This paper proposes a security integration model of mobile intelligent private data for edge
computing. According to the characteristics of the heterogeneous network of edge …

Intelligent secure mobile edge computing for beyond 5G wireless networks

S Lai, R Zhao, S Tang, J Xia, F Zhou, L Fan - Physical Communication, 2021 - Elsevier
Computational task offloading at the mobile edge servers is a promising strategy to reduce
latency and energy consumption in 5G wireless networks. In this paper, we study the …

Secure resource allocation in mobile edge computing systems

H Yang, JB Wang, M Cheng, C Chang… - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
With the development of Internet of Things, the mobile edge computing has become a
promising technology for real-time communications. This paper investigates a mobile edge …

Confidential information protection method of commercial information physical system based on edge computing

X Zhang, J Lu, D Li - Neural Computing and Applications, 2021 - Springer
With the rapid integration and wide application of the enterprise Internet of Things, big data
and 5G-class large networks, traditional enterprise cloud computing systems cannot timely …

Security and privacy-aware artificial intrusion detection system using federated machine learning

KPS Kumar, SAH Nair, DG Roy, B Rajalingam… - Computers & Electrical …, 2021 - Elsevier
Beyond 5G networks integrating 5G technology offer efficient services globally with
sustainable higher capacity and much lower latency across various applications. Moving …

Optimal defense strategy model based on differential game in edge computing

Y Sun, Y Li, X Chen, J Li - Journal of Intelligent & Fuzzy …, 2020 - content.iospress.com
Edge computing extends the cloud computing paradigm to the edge of the network to offset
the shortcomings of traditional cloud computing in mobile support, low delay, and location …

Network security technology of intelligent information terminal based on mobile internet of things

N Sun, T Li, G Song, H Xia - Mobile Information Systems, 2021 - Wiley Online Library
In the process of implementing the Internet of Things, the object itself has identity information
and identification equipment and encounters difficulties in communication security during …

An optimization scheme of data link security transmission based on mobile edge computing

H Zhang, J Xue, X Guan, Z Ma, J Xu - Ad Hoc Networks, 2024 - Elsevier
For the past few years, the security of data transmission links has been increasingly valued.
However, with the increasing requirements for the security performance of data transmission …

A computing resource allocation optimization strategy for massive internet of health things devices considering privacy protection in cloud edge computing …

J Wang, L Wang - Journal of Grid Computing, 2021 - Springer
With the development of 5G and the explosive growth of massive Internet of Health Things
devices, existing computing resource allocation strategies have many problems such as …

Secure computation offloading and service caching in mobile edge computing networks

M Wu, K Li, L Qian, Y Wu, I Lee - IEEE Communications Letters, 2024 - ieeexplore.ieee.org
Mobile edge computing (MEC) enables the caching of various services close to users,
thereby reducing service delay for emerging applications. However, realizing efficient and …