Indexed by:
Abstract:
The current deep integration of the Internet of Things and edge computing has improved the computing capabilities of the perception layer of the Internet of Things. The existing edge computing offloading technology has the problems of lack of a security authentication mechanism and a single problem of solidification of offloading strategies. Based on this, this paper studies the trusted authentication mechanism for the Internet of Things and the optimization scheme of computing offloading. While ensuring the network security of the perception layer of the Internet of Things, according to the changes of the perception layer network, adaptively adjust the computing task offloading strategy for the Internet of Things terminal to improve the operating efficiency of the perception layer of the Internet of Things. © 2022 ACM.
Keyword:
Reprint Author's Address:
Email:
Source :
Year: 2022
Page: 146-151
Language: English
Cited Count:
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 10
Affiliated Colleges: