Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing

Mobile edge computing (MEC) effectively integrates wireless network and Internet technologies and adds computing, storage, and processing functions to the edge of cellular networks. This new network architecture model can deliver services directly from the cloud to the very edge of the network while providing the best efficiency in mobile networks. However, due to the dynamic, open, and collaborative nature of MEC network environments, network security issues have become increasingly complex. Devices cannot easily ensure obtaining satisfactory and safe services because of the numerous, dynamic, and collaborative character of MEC devices and the lack of trust between devices. The trusted cooperative mechanism can help solve this problem. In this paper, we analyze the MEC network structure and device-to-device (D2D) trusted cooperative mechanism and their challenging issues and then discuss and compare different ways to establish the D2D trusted cooperative relationship in MEC, such as social trust, reputation, authentication techniques, and intrusion detection. All these ways focus on enhancing the efficiency, stability, and security of MEC services in presenting trustworthy services.

[1]  Rajkumar Buyya,et al.  Network-centric performance analysis of runtime application migration in mobile cloud computing , 2015, Simul. Model. Pract. Theory.

[2]  Dario Pompili,et al.  Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and Challenges , 2016, IEEE Communications Magazine.

[3]  Xiaoyong Li,et al.  A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion , 2018, IEEE Access.

[4]  Athanasios V. Vasilakos,et al.  Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..

[5]  Giancarlo Fortino,et al.  An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0 , 2019, IEEE Transactions on Industrial Informatics.

[6]  Ahmad Ridha,et al.  Feedback behavior and its role in trust assessment for peer-to-peer systems , 2010, Telecommun. Syst..

[7]  Jean Peccoud,et al.  Cyberbiosecurity: From Naive Trust to Risk Awareness. , 2018, Trends in biotechnology.

[8]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[9]  Zdenek Becvar,et al.  Mobile Edge Computing: A Survey on Architecture and Computation Offloading , 2017, IEEE Communications Surveys & Tutorials.

[10]  Wenbin Yao,et al.  Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service , 2018, IEEE Transactions on Information Forensics and Security.

[11]  Yan Zhang,et al.  Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.

[12]  Brij B. Gupta,et al.  Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..

[13]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[14]  Xiaoming Fu,et al.  Reducing the network overhead of user mobility–induced virtual machine migration in mobile edge computing , 2018, Softw. Pract. Exp..

[15]  Feng Zhou,et al.  Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds , 2015, IEEE Transactions on Parallel and Distributed Systems.

[16]  Martin Maier,et al.  Mobile Edge Computing Empowered Fiber-Wireless Access Networks in the 5G Era , 2017, IEEE Communications Magazine.

[17]  Gang Qu,et al.  A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy , 2019, IEEE Transactions on Intelligent Transportation Systems.

[18]  Xiaoyong Li,et al.  Dynamic Trustworthiness Overlapping Community Discovery in Mobile Internet of Things , 2018, IEEE Access.

[19]  F. Richard Yu,et al.  Secure Social Networks in 5G Systems with Mobile Edge Computing, Caching, and Device-to-Device Communications , 2018, IEEE Wireless Communications.

[20]  Stefano Chessa,et al.  A Social-Driven Edge Computing Architecture for Mobile Crowd Sensing Management , 2019, IEEE Communications Magazine.

[21]  Jing Zhang,et al.  An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks , 2019, IEEE Transactions on Intelligent Transportation Systems.

[22]  Jordi Pérez-Romero,et al.  Introducing Mobile Edge Computing Capabilities through Distributed 5G Cloud Enabled Small Cells , 2016, Mob. Networks Appl..

[23]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[24]  Wei Ni,et al.  Stochastic Online Learning for Mobile Edge Computing: Learning from Changes , 2019, IEEE Communications Magazine.

[25]  Michal Choras,et al.  A scalable distributed machine learning approach for attack detection in edge computing environments , 2018, J. Parallel Distributed Comput..

[26]  Hong Liu,et al.  Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing , 2018, IEEE Network.

[27]  Maria Rita Palattella,et al.  Internet of Things in the 5G Era: Enablers, Architecture, and Business Models , 2016, IEEE Journal on Selected Areas in Communications.

[28]  Feng Zhou,et al.  A multi-dimensional trust evaluation model for large-scale P2P computing , 2011, J. Parallel Distributed Comput..

[29]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[30]  Wazir Zada Khan,et al.  Edge computing: A survey , 2019, Future Gener. Comput. Syst..

[31]  Rong Yu,et al.  Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks , 2017, IEEE Access.

[32]  Mohsen Guizani,et al.  Security in the Internet of Things Supported by Mobile Edge Computing , 2018, IEEE Communications Magazine.

[33]  Xiao-Yong Li,et al.  Research on Dynamic Trust Model for Large Scale Distributed Environment , 2007 .

[34]  Robert H. Deng,et al.  Three architectures for trusted data dissemination in edge computing , 2006, Data Knowl. Eng..

[35]  Santosh Biswas,et al.  MATEM: A unified framework based on trust and MCDM for assuring security, reliability and QoS in DTN routing , 2018, J. Netw. Comput. Appl..

[36]  Khaled Ben Letaief,et al.  Dynamic Computation Offloading for Mobile-Edge Computing With Energy Harvesting Devices , 2016, IEEE Journal on Selected Areas in Communications.

[37]  Xing Zhang,et al.  A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications , 2017, IEEE Access.

[38]  Ivan Stojmenovic,et al.  An overview of Fog computing and its security issues , 2016, Concurr. Comput. Pract. Exp..

[39]  Feng Zhou,et al.  Scalable Feedback Aggregating (SFA) Overlay for Large-Scale P2P Trust Management , 2012, IEEE Transactions on Parallel and Distributed Systems.

[40]  Ching-Hsien Hsu,et al.  Edge server placement in mobile edge computing , 2019, J. Parallel Distributed Comput..

[41]  Feng Zhou,et al.  T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services , 2015, IEEE Transactions on Information Forensics and Security.