Next Article in Journal
Impact of Information Sharing and Forecast Combination on Fast-Moving-Consumer-Goods Demand Forecast Accuracy
Previous Article in Journal
Understanding the Propagation and Control Strategies of Congestion in Urban Rail Transit Based on Epidemiological Dynamics Model
Open AccessReview

Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing

1
Key Laboratory of Trustworthy Distributed Computing and Service (Beijing University of Posts and Telecommunications), Ministry of Education, Haidian District, Beijing 100876, China
2
China Electric Power Research Institute, Haidian District, Beijing 100192, China
*
Authors to whom correspondence should be addressed.
Information 2019, 10(8), 259; https://doi.org/10.3390/info10080259
Received: 22 June 2019 / Revised: 1 August 2019 / Accepted: 12 August 2019 / Published: 15 August 2019
(This article belongs to the Section Review)
  |  
PDF [1076 KB, uploaded 15 August 2019]
  |  

Abstract

Mobile edge computing (MEC) effectively integrates wireless network and Internet technologies and adds computing, storage, and processing functions to the edge of cellular networks. This new network architecture model can deliver services directly from the cloud to the very edge of the network while providing the best efficiency in mobile networks. However, due to the dynamic, open, and collaborative nature of MEC network environments, network security issues have become increasingly complex. Devices cannot easily ensure obtaining satisfactory and safe services because of the numerous, dynamic, and collaborative character of MEC devices and the lack of trust between devices. The trusted cooperative mechanism can help solve this problem. In this paper, we analyze the MEC network structure and device-to-device (D2D) trusted cooperative mechanism and their challenging issues and then discuss and compare different ways to establish the D2D trusted cooperative relationship in MEC, such as social trust, reputation, authentication techniques, and intrusion detection. All these ways focus on enhancing the efficiency, stability, and security of MEC services in presenting trustworthy services. View Full-Text
Keywords: mobile edge computing; trusted cooperative mechanism; D2D; social trust; reputation; authentication techniques mobile edge computing; trusted cooperative mechanism; D2D; social trust; reputation; authentication techniques
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Yuan, J.; Li, E.; Kang, C.; Chang, F.; Li, X. Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing. Information 2019, 10, 259.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Information EISSN 2078-2489 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top