1. Introduction
With the development of 5G and artificial intelligence, data generation is exploding, and the total amount of global data will grow to 175 ZB by 2025 [
1]. More than 49% of these data will be stored in public cloud environments. These put forward extremely high requirements on network delay, data security and controllability [
2]. Due to the huge amount of data contributed by massive IoT devices, traditional cloud processing produces high end-to-end delays and brings huge loads to the transmission communication network. In order to effectively meet the new requirements of low delay, privacy and energy saving, edge computing was born [
3,
4]. However, the limited computing power of edge end cannot fully meet the increasing demand of edge devices. Edge computing cannot replace cloud computing, but can act as a supplement to cloud computing together with edge devices, presenting an architecture form of Cloud-Edge-End Collaboration, as shown in
Figure 1. However, the architecture of CEEC also has some security challenges. Firstly, because of the heterogeneity and complexity of CEEC networks, the traditional centralized security mechanism cannot be applied well. Secondly, due to the openness of CEEC networks and the high dynamic nature of edge devices, it is difficult to effectively identify malicious edge devices. However, edge devices have limited resources, which makes them vulnerable to attacks, and lack effective lightweight security mechanisms. Therefore, it is necessary to build a trusted environment and study the trust management of CEEC.
Some research has been conducted on trust evaluation in edge computing [
5,
6,
7]. Yu et al. [
8] took multi-dimensional trust data as the training set of a BP neural network to evaluate the trust degree of edge nodes in a computational power network, and adopted the improved particle swarm optimization algorithm to optimize the structure and weight of the neural network so as to effectively improve the detection rate of malicious nodes. This method adaptively adjusted the weight of trust aggregation. Particle swarm optimization was used as feedback to realize the incentive mechanism for edge nodes. However, it did not take into account privacy protection and computational costs. It was also not tested for anti-aggression. In the literature [
9], the decision tree classification model method was used to construct trust rules, and the Euclidean distance concept was used to calculate the trust value in the calculation of recommendation trust. Furthermore, the artificial neural network function was used to self-train the vehicle nodes that did not meet the expected trust value to improve the vehicle trust degree. This work developed a manual training model as an incentive mechanism. However, it did not consider privacy protection and anti-aggression. It also did not take into account computational costs. In the literature [
10], a capsule neural network was used to predict trust attributes based on historical data to obtain the trust value of edge devices. Only the shallow network structure and a small amount of training data were needed to realize the trust evaluation, which met the time requirements of frequent processing of multi-modal and small-sample data in edge scenarios. This study used a capsule neural network to aggregate trust attributes and overcome the subjectivity of trust weights. However, it did not consider privacy protection and incentives. It also did not analyze adaptability to attacks and did not consider the computational cost of the algorithm. Zhang et al. [
11] proposed a credible edge platform by combining blockchain with edge computing. This realizes the lightweight design of the platform through the microservice architecture. It improves the portability of the platform by introducing the Edgex Foundry framework, and it also verifies the availability of the trusted edge platform by deploying it on multiple network nodes for simulation.
Huang et al. [
12] used multi-weight subjective logic to realize the credit value calculation of the reputation system and construct the local and global reputation. They determined the weight of reputation according to the three aspects of familiarity, similarity and timeliness, and constantly updated the value of reputation. This method improved the efficiency of resource allocation. However, it did not take into account privacy protection and robustness against attacks. It also did not take into account inter-transmission incentives. At the same time, the establishment of weight in reputation calculation was subjective, which reduced the accuracy of trust values. Wang et al. [
13] introduced trust chains when evaluating trust of sensor nodes. The trust value of a single atomic trust chain combined interaction trust, energy trust and recommendation trust. The fine-grained trust values of sensor nodes were evaluated by serial and parallel trust transitions in the merged trust chain. This approach was robust against malicious attacks. However, it did not consider privacy protection and incentive of trust data. The computational cost of the algorithm has not been evaluated. It also did not discuss the weight of trust aggregation, which reduced the accuracy of trust values. In the literature [
14], node trust was evaluated according to several parameters. Direct trust evaluation considered node communication success rate, proximity, packet loss rate and residual energy. In the evaluation of indirect trust, recommendation trust with different weights came from the surrounding nodes. Finally, the trust was aggregated to obtain a multi-dimensional comprehensive trust value. This method could resist malicious attacks and balanced the energy consumption of nodes. However, it did not consider privacy protection and incentives. In the calculation and aggregation of direct and indirect trust, it did not analyze the specific allocation of trust weight. Tian et al. [
15] collected trust values from multi-source evaluation from the perception level, and assigned weights to different types of trust evaluation values according to service attribute sets, self-service evaluation factors, user quality evaluation factors and social sensor personality preferences so as to achieve multi-dimensional aggregation of trust values. This method considered the adaptability of trust weight and reduced the computational cost. However, it did not consider privacy protection and robustness against attacks. It also did not consider the incentive mechanism between sensor nodes.
Fuzzy logic constructs multiple fuzzy factors by modeling the uncertain factors, deducing the uncertainty relation of entity behavior through fuzzy operators, evaluating the subject using the fuzzy comprehensive evaluation algorithm and, finally, obtaining the result. Some examples from the literature [
16,
17,
18,
19,
20,
21] introduce fuzzy logic technology to implement trust management in edge computing. In the literature [
16], prior knowledge in trust evaluation was provided by a fuzzy inference system, which combined expert knowledge of trust evaluation into a fuzzy rule base using fuzzy methods. It was also based on artificial neural networks to capture different patterns to make decisions about the trust status of IoT nodes. In the literature [
17], the uncertainty in trust evaluation was divided into three fuzzy sets: packet loss factor, false packet injection factor and content change factor. The algorithm based on fuzzy logic was used to evaluate the trust degree of vehicles, and the network topology factor was introduced to combat data change attack. This method could resist packet loss attack, error injection attack and data change attack. It also solved the uncertainty of trust weight by aggregating trust factors through fuzzy logic. However, it did not consider privacy or incentives. It also did not estimate the computational cost. Serin et al. [
18] reduced security threats by establishing a credible environment based on ambiguity in smart cities. The model could effectively avoid and isolate malicious nodes in IoT, and reduced the impact of collusion attacks. However, the above work is one-sided in the extraction of trust data when constructing fuzzy factor subsets, which will affect the accuracy of trust evaluation values. In order to improve service quality, Hossain et al. [
19] designed the collaborative task offloading scheme FCTO by taking the delay sensitivity of QOS as the fuzzy input parameter. This scheme optimizes the task completion time and server utilization by introducing fuzzy logic in task offloading.
Due to the selfish behavior of edge nodes, the quality and reliability of their trust evaluation in complex and changeable network environments are affected. An incentive mechanism can be introduced to reward the quality of trust evaluation results so as to improve the initiative of edge nodes in trust evaluation with limited resources. The incentive mechanism in trust evaluation is the direction of future research. In recent years, some research has taken incentive into account. In the literature [
22], smart contracts were used to automatically punish the misconduct of stakeholders. Additionally, decentralized accountability mechanisms and automatic rewards were developed to encourage nodes to verify collaboration services and provide verification rewards. This regulated the behavior of participants and built a reliable edge computing network. In the literature [
23], the cloud server set rewards for data collectors who actively collected sparse and high-quality data in remote areas so as to increase the collection contribution and, thus, improve the overall quality of data collection. In the literature [
24], an incentive mechanism was designed: the winner of the competition was given the basic reward, and those who finished early were given extra rewards. These rewards would entice edge servers to complete computational tasks initiated by their peers and encouraged them to complete them quickly. In the literature [
25], vehicles were encouraged to intentionally maintain trusted data sharing through the self-executing nature of smart contracts in a blockchain. It used the contribution of the vehicle as an incentive and adjusted the proportion of the reward according to how trustworthy the data were. In the literature [
26], a penalty factor was introduced into the trust value of the vehicle, so that the vehicle refusing to provide service can obtain a lower trust value, and if the vehicle provided a false location, its trust value would be greatly reduced. This discouraged dishonest vehicles and incentivized selfish vehicles to actively offer their services. In the literature [
27], users were motivated by the development of an effective voting mechanism with built-in consensus and punishment functions in the blockchain. The nodes involved in the verification would be rewarded with part of the deposit, while the abusive users would be punished and blacklisted. In the literature [
28], UAVs were used to collect partially verifiable data, and random sampling by trusted third parties was used for joint trust evaluation. Therefore, the uncertainty of verifiable collected data increased the likelihood of detecting fake data uploads by mobile edge users, thus achieving the purpose of motivating users to upload trusted data honestly. In the literature [
29], when evaluating trust in data in federated learning, a trust reward and punishment method was proposed in order to achieve the incentive of consensus of trust. When a task was completed, a certain amount of credit would be added. However, when the trust value was large, the proportion of increased trust value would be reduced so that the trust value of nodes added later could quickly catch up. In order to realize the fairness among all nodes, the punishment degree of each node was different. The higher the trust value, the harsher the punishment was to ensure the fairness of rewards and punishments. However, all the above research works were short-term incentives for the edge devices, and the effect of incentives was limited, which may cause the intermittent selfish behavior of the edge devices.
Overall, our study investigates the gaps in the above studies and makes the following contributions:
Firstly, we propose a Cloud-Edge-End Collaboration (CEEC) computing power architecture and design a lightweight fuzzy cooperative trust evaluation model (LFCTEM) for edge devices, which fuzzies the uncertainty factors in the CEEC network. By constructing four fuzzy trust factors, we evaluate the trust value of edge devices according to the success rate of direct interaction, adjacent distance, public interaction success rate and cooperative positivity of the edge device group.
Secondly, we introduce the incentive mechanism in the trust evaluation algorithm to encourage the edge devices through the cooperation reward scores, quality reward scores and efficiency reward scores. We also adopt the incentive negative decay mechanism to improve the continuity of active cooperation of edge devices so as to avoid their intermittent selfish behavior.
Finally, we present experiments carried out on the OMNET++5.6.2 simulation platform, and further comparison of our algorithm with DTEM and FLTEEV algorithms, thus proving the effectiveness and advantages of our model.
2. Materials and Methods
2.1. Cloud-Edge-End Collaboration (CEEC) Computing Power Architecture
The architecture of each cooperative computing power in the CEEC environment is shown in
Figure 2. The cooperative computing system in the CEEC architecture includes the cloud layer, edge layer and end layer.
The cloud layer has high computing power, and the powerful computing resources of the cloud can be used to achieve the incentive reward for the edge devices. When the edge devices have intermittent selfish behavior, its incentive integral is negatively attenuated.
The edge layer includes edge servers. Each edge server stores the adjacent history interaction data and incentive scores of dynamic heterogeneous computing powers in the region. Edge servers cooperate to evaluate the trust value between edges and manage the global trust database so as to ensure the efficient operation of CEEC networks.
The end layer is mainly composed of a variety of heterogeneous computing devices at the edge, including intelligent sensors, desktops, intelligent vehicles, intelligent gateways and so on. Each dynamic heterogeneous computing device is abstracted as a dynamic heterogeneous edge device. Because these edge devices are dynamically heterogeneous, with a change in their position they will enter the area managed by different edge servers and the dynamic heterogeneous computing devices in this area will perform collaborative computing within the edge.
2.2. Associated Trust and Security Issues
There are several trust and security issues in CEEC networks as follows:
Privacy protection issues: When maintaining trust in edge computing, users need to exchange trust data frequently, which may contain their private information. Disclosure of private data will create additional security concerns and most research does not take privacy into account. With the continuous promotion of edge computing and the rapid growth of IoT devices, the problem of data privacy warrants further study. Privacy protection models also need to adapt to the needs of various complex edge computing scenarios.
Trust weight allocation issues: In the trust evaluation methods based on traditional mathematical statistics, the trust value is usually determined by aggregating trust factors through weighting and other related calculations. However, there is no basis to determine the trust weight. Some studies determine the trust weight based on subjective judgment, while others determine the trust weight based on experience. All of these will lead to inaccurate trust weight allocation, thus affecting the results of trust evaluation. Therefore, it is necessary to further study the allocation of trust weight and develop a new trust aggregation method.
Edge intelligence trust management problem: In the edge intelligence scenario, there is no trust management mechanism for heterogeneous data owners. In edge intelligence networks, a single data owner may hold multiple training data sets that are heterogeneous in quality and type. The existing trust model is mainly oriented to a single application scenario and cannot realize the compatible trust management of multiple heterogeneous training data sets held by a single data owner. There is a lack of unified management mechanism to fully and flexibly manage the trust of the data owners of the edge intelligence networks.
2.3. Lightweight Fuzzy Collaborative Trust Evaluation Model
In order to effectively evaluate the trust value of edge devices in the CEEC environment, we design a lightweight fuzzy cooperative trust evaluation model (LFCTEM). In this paper, four trust factors generated by fuzzy sets are used to fully model the neighboring cooperation attributes of edge devices and the trust value of edge devices is evaluated based on the fuzzy logic algorithm. The fuzzy logic system is used to overcome the indirect uncertainty of the trust mechanism.
In the CEEC environment, a group of neighboring edge devices is used to evaluate the trust value of one of the edge devices so as to further improve the reliability of the trust evaluation value. However, due to the complexity of the CEEC environment, the unreliability of wireless communication transmission and the unpredictability of edge device behavior, uncertainty will be introduced in the collaboration trust evaluation. Uncertainty is also introduced by the fact that the edge devices often generate inaccurate and incomplete information. In the CEEC environment, any slight change may lead to mismatch between the calculation result of the trust value and the real-time state of the edge device, thus affecting the accuracy of the trust value. Therefore, in the continuous cycle, we use fuzzy logic to alleviate this mismatch. In this paper, the input–output relation of the fuzzy algorithm based on the IF–THEN rule is constructed.
The fuzzy logic algorithm designed in this paper includes four trust factors generated by fuzzy sets as input, which are direct interaction success rate factor (DISRF), adjacent distance factor (ADF), public interaction success rate factor (PISRF) and cooperative incentive mechanism factor (CMF). Their membership functions are shown in
Figure 3.
- (1)
Direct interaction success rate factor (DISRF) represents the interaction success rate between an edge device and its neighboring edge devices. It is an entity-centric trust factor. Due to the high dynamic of edge devices and the unreliability of wireless communication transmission, the number of neighboring edge devices is constantly changing, which leads to the uncertainty of their direct trust relationship. With the decrease in the success rate of direct interaction, the uncertainty of the direct trust relationship with neighboring edge devices will increase. The calculation of the interaction success rate between an edge device and its neighboring edge devices is shown in Equation (1). In this paper, DISRF is set to include two options: malicious and normal, ranging from 0 to 100%. The membership function of DISRF is shown in
Figure 3a.
- (2)
Adjacent distance factor (ADF) represents the interaction distance between the host and guest of an edge device group. It is an entity-centric trust factor. Because the density and environment of the edge device group will change over time, the recommendation weight of the edge device group is uncertain when evaluating the collaborative recommendation trust. At the same time, recommended trust is mainly obtained based on the indirect trust relationship between the public edge devices of the host and guest edge devices. As the adjacent distance between the host and guest edge devices increases, the uncertainty of its indirect trust relationship with the public edge devices will also increase. The calculation of the interaction distance between the host and guest of edge device group is shown in Equation (2). In this paper, ADF is set to include three options: short, medium and long, ranging from 0 to 300 m. The membership function of ADF is shown in
Figure 3b.
- (3)
Public interaction success rate factor (PISRF) represents the interaction success rate between the host and guest of an edge device group and their public edge devices. It is an entity-centric trust factor. Due to the high dynamic of edge devices and the unreliability of wireless communication transmission, the number of public edge devices between the host and the guest edge devices is constantly changing, which leads to the uncertainty of their indirect trust relationship. With the decline in the success rate of public interaction, the uncertainty of the indirect trust relationship with the public edge devices will also increase. The calculation of the interaction success rate between the host and guest of the edge device group and their public edge device is shown in Equation (3). In this paper, PISRF is set to include three options: low, medium and high, ranging from 0 to 100%. The membership function of PISRF is shown in
Figure 3c.
- (4)
Collaboration incentive mechanism factor (CMF) represents the positive inclination of neighboring edge device groups to participate in collaboration. It is a data-centric trust factor. Due to the selfishness of edge devices, they may intentionally limit the consumption of computing resources in order to protect their own interests during the collaborative tasks, which leads to the uncertainty of the collaborative behavior of edge devices. As the collaboration positivity of the edge devices decreases, the uncertainty of the recommendation trust value generated by the adjacent edge devices will also increase. The incentive score for the group of adjacent edge devices is described in detail in the next section. In this paper, CMF is set to include three options: negative, normal and active, ranging from 0 to 300. The membership function of CMF is shown in
Figure 3d.
where
is the interaction success rate between an edge device and its neighboring edge devices,
is the neighboring edge devices of the edge device,
is the number of successful interactions and
is the number of failed interactions.
where
is the interaction distance between the host and guest of the edge device group, is the location of the host edge device,
and
is the location of the guest edge device.
where
is the interaction success rate between the host and guest of the edge device group and their public edge devices,
is the public edge devices for the host and guest of the edge device group,
is the number of successful interactions and
is the number of failed interactions.
The output of the fuzzy logic algorithm designed in this paper is the trust evaluation value (TEV), which contains four options: Untrust, Trust-3, Trust-2 and Trust-1, ranging from 0 to 1. The membership function of TEV is shown in
Figure 4. The fuzzy logic algorithm consists of 54 fuzzy logic rules, as shown in
Table 1.
When the output membership value of the fuzzy logic algorithm is obtained, it will be defuzzed to obtain the trust evaluation value. In this paper, the fuzzy logic library of MATLAB is used to construct the fuzzy logic trust evaluation algorithm and deblur the output membership value.
2.4. Incentive Score Mechanism
Since all the participants in the trust evaluation are dynamically distributed and organized together, and their management is relatively loose, the incentive mechanism can effectively ensure the quality of the collaborative evaluation. For the edge devices, the benefits of participating in the trust evaluation should be proportional to the computing resources invested so as to keep their positivity towards continuing to participate in the collaborative evaluation. For the edge side, the quality of the evaluation should be improved by recruiting high-quality edge devices for collaboration through incentive mechanisms. Therefore, we need to find a balance between the consumption of edge computing resources and the quality of collaborative trust evaluation. We designed an incentive mechanism and introduced incentive scores. The incentive score can be used by edge devices to obtain resources and collaboration assistance, thus ensuring the integral value of the incentive score in an edge collaboration environment. The key idea is to stimulate the positivity of the edge devices towards participating in the cooperative trust evaluation through incentive scores, and to use negative attenuation to improve the persistence of the positive cooperation of the edge devices.
In the CEEC environment, the incentive score mechanism is used to achieve the balance between resource regulation and collaborative evaluation. As shown in
Figure 5, the edge devices can obtain the incentive score in the following three ways:
- (1)
When the edge device is assigned a collaborative trust evaluation task and completes the evaluation task it is responsible for on time, it will receive the basic cooperation reward score.
- (2)
According to the quality of the evaluation task assigned to the edge device, it will receive a quality reward score. In this paper, the completion quality of the trust evaluation task is evaluated mainly by the accuracy of collaborative evaluation. By setting the threshold, the completion quality is divided into three levels (excellent, medium and low), and the corresponding quality reward scores are matched according to the completion quality of different levels.
- (3)
Based on the time it takes to complete the evaluation task assigned to the edge device, it receives an efficiency reward score. When the edge device completes the task assigned to it in advance, the corresponding efficiency reward scores are matched according to the time to complete the task ahead of schedule.
When the edge initiates a cooperative trust evaluation task
for the edge device group, the edge first broadcasts the information about the cooperative trust evaluation task
on the CEEC environment, including the maximum completion time
and the basic cooperative reward score
of
. The value of
is mainly determined by the amount of task computation and the priority of
at the edge. For collaborative trust evaluation tasks with heavy computation or high priority, the basic cooperation reward scores are also higher, which improves the attraction of collaborative edge devices and facilitates the completion of collaborative trust evaluation tasks. When the collaborative trust evaluation task
is completed, the total incentive score awarded to the collaborative edge devices are calculated as follows:
where
is basic cooperation reward score,
is quality reward score and
is efficiency reward score.
is calculated from the quality of completion of the trust evaluation tasks assigned to the edge devices. We set the quality threshold
and
(
), and the completion quality is divided into excellent (collaborative evaluation quality is
or above), medium (collaborative evaluation quality is between
and
) and low (collaborative evaluation quality is below
). In order to motivate the edge devices to complete the cooperative trust evaluation task with high quality, we give the edge devices with excellent completion quality a higher increase in quality reward scores. For collaborative edge devices with moderate completion quality, we give moderate quality reward scores to maintain their base motivation. For collaborative edge devices with low completion quality, quality reward scores will not be given in this paper. The calculation of
is as follows:
where
is the baseline quality reward score,
and
are the quality threshold of the collaborative trust evaluation task and
is the completion quality of the collaborative trust evaluation task.
is calculated from the accuracy of collaborative evaluation:
where
is the number of times that the collaboration evaluation of the edge device group is correct and
is the number of times that the collaboration evaluation of the edge device group is wrong.
is calculated from the completion time of the evaluation task assigned to the edge device:
where
is the baseline efficiency reward score and
is the actual time for the cooperative edge device to complete the collaboration trust evaluation task.
When the actual completion time of the collaborative edge device is shorter, the efficiency reward score will be higher. Conversely, when the actual completion time of the cooperative edge device exceeds , it will not receive the efficiency reward score.
Through this incentive reward mechanism, CEEC will reward collaborative edge devices that can accomplish the task of collaborative trust evaluation quickly and with high quality. The reward score is mainly used as a short-term incentive to quickly motivate cooperating edge devices.
2.5. Incentive Negative Decay Mechanism
When the cooperative edge devices have a high incentive scores reserve, there is no urgent need for incentive scores in the short term. In this case, short-term collaboration negativity may occur on such collaborative edge devices, which will affect the efficient collaboration of the CEEC environment. Therefore, in order to achieve long-term incentive and maintain the continuity of the active cooperation of the edge devices, we designed the incentive negative decay mechanism.
The main idea of the incentive negative decay mechanism is as follows. In this paper, the decay time interval is set as the negative decay threshold. When the collaborative edge device is in a negative state for a long time (that is, the collaborative edge device is not participating in the collaboration evaluation for longer than ), its incentive score will decay significantly. In order to avoid the significant decay of incentive score, the cooperative edge device needs to continuously participate in the cooperative evaluation task or intermittently participate in the cooperative evaluation task in a short time interval. This will maintain the continuity of the active cooperation of the edge device and achieve the effect of long-term incentive.
In the incentive negative decay mechanism, in order to give larger incentives to the cooperative edge device, the incentive score will decay rapidly with the increase in time in the initial decay stage. This is to urge the edge device to participate in the cooperative trust evaluation task as soon as possible. In the mid-decay stage, the decay amplitude of the incentive score will be properly slowed down so as to give the cooperative edge device reaction time to obtain the incentive score again. In the late decay stage, if the cooperative edge device does not participate in the cooperative trust evaluation task when it reaches the maximum decay time , its incentive score will decay to approach 0. Then the cooperative edge device will become a passive edge device and will not be able to access the computing resources and collaboration assistance provided by the CEEC environment.
Five combinations of undetermined formulas are considered in the design of the negative decay formula of incentive score in the incentive negative decay mechanism and we compare their decay rates comprehensively. The combinations of five undetermined formulas are shown in
Table 2, and their decay rates are shown in
Figure 6. In this paper, the initial decay stage is set between 0 and 6 h, the mid-decay stage is set between 6 and 16 h and the late decay stage is set between 16 and 48 h. We set the maximum decay time
to 48 h (two days). When the collaborative edge device does not participate in the collaborative trust evaluation task for two days, it is considered as a negative edge device and its incentive score decays to 0. According to
Figure 6, it can be found that the attenuation ranges of
and
are too small, and they cannot approach 0 in the late decay stage.
can approach 0 in the late decay stage, but its attenuation amplitude in the initial decay stage is not enough to give the cooperative edge device a large incentive. If the attenuation amplitude is too large in the initial decay stage, the incentive score will approach 0 in the mid-decay stage, and the mid-decay stage is not reserved for sufficient reaction time of the cooperative edge device.
After comprehensive analysis, we found that the decay rate of incentive integral of reaches 50% at the initial decay stage, which gives the cooperative edge device a large incentive. In the mid-decay stage, the decay rate of the incentive score gradually decays from 50% to 15%, giving the cooperative edge device sufficient reaction time to reacquire the incentive score. It can also approach 0 in the late decay stage, which meets the demand of the negative decay mechanism of incentive negative decay mechanism. Finally, we determined that is the negative decay formula of the incentive score.
Therefore, the calculation formula of the incentive negative decay mechanism is as follows:
where
is the time that the collaborative edge device is not participating in the collaboration evaluation and
is decay time interval.
In the CEEC environment, the decay rate of incentive score will be changed due to the change in the completion time of the collaboration trust evaluation task, the basic cooperation reward score, the incentive score consumed by obtaining the computing resources and the cooperation help provided by CEEC, and the duration of alternating between participating in collaboration and negative collaboration.
4. Conclusions
This paper designs a lightweight fuzzy collaborative trust evaluation model (LFCTEM) for edge devices, aiming at the dynamic and heterogeneous edge computing environment and efficient collaborative scheduling of computing power resources in the CEEC network. In this paper, the success rate of direct interaction, the adjacent distance, the success rate of public interaction and the cooperative incentive score of the group of edge devices in the CEEC network are converted by the membership function by fuzzing the trust factor. We calculate the trust value of the edge devices so as to improve the detection rate of malicious edge devices. Finally, in order to effectively solve the selfish behavior of edge devices, this paper designs a cooperative incentive score mechanism, which improves the positivity of collaborative trust evaluation of edge devices in the CEEC network by constructing basic incentive scores, quality incentive scores and efficiency incentive scores. We also design the incentive negative decay mechanism to ensure long-term incentives to mitigate the intermittent selfish behavior of the edge devices. Finally, simulation experiments are carried out on the theoretical basis and the feasibility and stimulation of the proposed model in the CEEC network are verified from many aspects. Compared with DTEM and FITEEV, our model enhances the detection rate of malicious edge devices by 19.11%, which improves the reliability of the CEEC trust environment. Furthermore, our model reduces the error detection rate of edge devices by 16.20%, thus alleviating error reporting of the CEEC trust environment.
As CEEC networks expand unceasingly, the efficient coordination scheduling of the vast amounts of highly dynamic heterogeneous computing power resources is still a big challenge. The next steps for research to focus on are how to make full use of the computing power resources, further reduce the idle time, build the multi-layer suitable for the large-scale deep learning trust evaluation scheduling network. In future work, the multi-dimensional trust attribute will be further considered to study the high dynamic adaptability and the high computational power resource utilization of the model.