Indexed by:
Abstract:
As a new type of network model, edge computing has strong computing offload ability, which can effectively alleviate the burden of cloud center and network communication, match the urgent demand of accelerating wireless terminals operational capabilities, and obtain rapid development and application. However, the existing edge computing authentication methods are mainly based on traditional identity authentication, which is difficult to prevent the network access of untrusted wireless terminals. Based on the above, this paper proposes a trusted connection architecture TCA-EC for edge computing, which is based on the trusted connection architecture TCA. The architecture realizes two-way identity authentication, two-way platform integrity authentication and two-way behavior trusted authentication between MEC server and wireless terminal, and ensures the security of edge computing. © 2021 IEEE.
Keyword:
Reprint Author's Address:
Email:
Source :
Year: 2021
Page: 464-468
Language: English
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 1
Affiliated Colleges: