Next Article in Journal
Semantic Segmentation Framework for Glomeruli Detection and Classification in Kidney Histological Sections
Previous Article in Journal
Deep Learning Applications with Practical Measured Results in Electronics Industries
Open AccessArticle

An Efficient and Credible Multi-Source Trust Fusion Mechanism Based on Time Decay for Edge Computing

1
School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
Key Laboratory of Trustworthy Distributed Computing and Service, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Electronics 2020, 9(3), 502; https://doi.org/10.3390/electronics9030502
Received: 6 February 2020 / Revised: 12 March 2020 / Accepted: 14 March 2020 / Published: 19 March 2020
(This article belongs to the Section Computer Science & Engineering)
With the development of 5G, user terminal computing moves up and cloud computing sinks, thus forming a computing fusion at the edge. Edge computing with high-efficiency, real-time, and fast features will become part of 5G construction. Utilizing distributed computing and storage resources at the edge of the network to perform distributed data processing tasks can alleviate the load on the cloud computing center, which is also the development trend of edge computing. When a malicious node exists, the error information feedback by the node will affect the result of local perception decision. To solve the problem of malicious behavior of the node, a node trust evaluation mechanism of interactive behavior is introduced. The trust mechanism for edge computing network environments is introduced as a novel security solution. First, the key thought of the trust mechanism proposed in this paper is to establish a trust relationship between edge nodes in open edge computing environment. Then, a multi-source trust fusion algorithm based on time decay aggregates direct interaction trust and different third-party recommendation trust to calculate the global trust of the evaluated nodes. Finally, simulation experiments show that the algorithm has a certain degree of improvement in computational efficiency and interaction success rate over other existing models, which reduces the situation of malicious node deception. View Full-Text
Keywords: edge computing; 5G; multi-source trust fusion mechanism; trust computing edge computing; 5G; multi-source trust fusion mechanism; trust computing
Show Figures

Figure 1

MDPI and ACS Style

Kong, W.; Li, X.; Hou, L.; Li, Y. An Efficient and Credible Multi-Source Trust Fusion Mechanism Based on Time Decay for Edge Computing. Electronics 2020, 9, 502.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop