Chinese Journal on Internet of Things ›› 2019, Vol. 3 ›› Issue (3): 76-83.doi: 10.11959/j.issn.2096-3750.2019.00122

Special Issue: 边缘计算

• Theory and Technology • Previous Articles     Next Articles

Research on distributed multi-access edge computing based on mimic defense theory

Hongyi ZHU(),Xiaoyuan LU,Yi LI   

  1. Shanghai Engineering Research Center for Broadband Technologies and Applications,Shanghai 200436,China
  • Revised:2019-07-12 Online:2019-09-30 Published:2019-10-14
  • Supported by:
    The Key Research and Development Program of China(2017YFB0803205);Science Research Program of Shanghai Scientific and Technology Committee(18DZ1100503)

Abstract:

The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computing was proposed.By segmenting data,padding check data and processing data at multiple edge node,dynamic scheduling and decision-making functions according to checksum were implemented.The simulation results show that with the increase of delay cost,the data manipulation and leak rates can be reduced effectively by the proposed structure.The edge node scheduling strategy based on trust and cost is proposed to improve the efficiency and security of the system.

Key words: multi-access edge computing, task orchestration, mimic security defense, dynamic heterogeneous redundancy

CLC Number: 

No Suggested Reading articles found!