Solving Security Problems in MEC Systems
- Resource Type
- Conference
- Authors
- Zheng, Xiao; Li, Mingchu; Chen, Yuanfang; Guizani, Mohsen; Liu, Jia; Tahir, Muhammad
- Source
- 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC) Wireless Communications & Mobile Computing Conference (IWCMC), 2019 15th International. :1847-1852 Jun, 2019
- Subject
- Communication, Networking and Broadcast Technologies
Security
Software
History
Computational modeling
Servers
Mathematical programming
Mathematical model
Mobile edge computing(MEC)
Synthetic principles
Mobile users (MUs)
Agents capable
Suboptimal
Security strategies
- Language
- ISSN
- 2376-6506
We propose an algorithm for constructing efficient security strategies in the mobile edge computing (MEC), where the protected targets are nodes connected to the MEC and the mobile users (MUs) are agents capable of preventing undesirable activities on the nodes. The algorithm is designed based on the synthetic principles of a specific set of strategies, and it can quickly construct suboptimal solutions even if the number of targets reaches hundreds of millions.