A trust evaluation system based on reputation data in Mobile edge computing network

In recent days, Mobile Edge Computing (MEC) emerges as a new computing paradigm that pushes computing resources towards the edge of the Internet and close to end users and more scholars begin to carry out their different kinds of research under the framework of edge computing. Unlike cloud computing...

Full description

Saved in:
Bibliographic Details
Published inPeer-to-peer networking and applications Vol. 13; no. 5; pp. 1744 - 1755
Main Authors Deng, Xiaoheng, Liu, Jin, Wang, Leilei, Zhao, Zhihui
Format Journal Article
LanguageEnglish
Published New York Springer US 01.09.2020
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1936-6442
1936-6450
DOI10.1007/s12083-020-00889-3

Cover

Abstract In recent days, Mobile Edge Computing (MEC) emerges as a new computing paradigm that pushes computing resources towards the edge of the Internet and close to end users and more scholars begin to carry out their different kinds of research under the framework of edge computing. Unlike cloud computing however, edge computing often lacks a centralized security mechanism, which increases the security risks of resource consumers. Therefore, to address security issues for facilitating MEC well, we focus on the establishment of an effective trust evaluation system in this paper. We presented a Reputation-based Trust Evaluation and Management (RTEM) system for a secure and efficient MEC network, wherein the edge servers are adopted to execute reputation data management for mobile edge nodes. In this system, a three-tier trust evaluation framework (identity trust, capability trust, behavior trust) was proposed to ensure the edge nodes that join the network system for service interaction are qualified, capable, and reliable. In order to update and calculate reputation data more accurately, we designed a reputation-based trust evaluation model and evaluated the effectiveness and robustness of our designed model on the OMNeT++ platform. The results show that our proposed mechanism can increase the transaction success rate of the edge network by more than two times compared with the network without trust evaluation mechanism, and perform better than the traditional subject logic (TSL) trust evalaution mechanism.
AbstractList In recent days, Mobile Edge Computing (MEC) emerges as a new computing paradigm that pushes computing resources towards the edge of the Internet and close to end users and more scholars begin to carry out their different kinds of research under the framework of edge computing. Unlike cloud computing however, edge computing often lacks a centralized security mechanism, which increases the security risks of resource consumers. Therefore, to address security issues for facilitating MEC well, we focus on the establishment of an effective trust evaluation system in this paper. We presented a Reputation-based Trust Evaluation and Management (RTEM) system for a secure and efficient MEC network, wherein the edge servers are adopted to execute reputation data management for mobile edge nodes. In this system, a three-tier trust evaluation framework (identity trust, capability trust, behavior trust) was proposed to ensure the edge nodes that join the network system for service interaction are qualified, capable, and reliable. In order to update and calculate reputation data more accurately, we designed a reputation-based trust evaluation model and evaluated the effectiveness and robustness of our designed model on the OMNeT++ platform. The results show that our proposed mechanism can increase the transaction success rate of the edge network by more than two times compared with the network without trust evaluation mechanism, and perform better than the traditional subject logic (TSL) trust evalaution mechanism.
Author Deng, Xiaoheng
Liu, Jin
Wang, Leilei
Zhao, Zhihui
Author_xml – sequence: 1
  givenname: Xiaoheng
  orcidid: 0000-0002-7439-7720
  surname: Deng
  fullname: Deng, Xiaoheng
  email: dxh@csu.edu.cn
  organization: School of Computer Science and Engineering, Central South University
– sequence: 2
  givenname: Jin
  surname: Liu
  fullname: Liu, Jin
  organization: School of Computer Science and Engineering, Central South University
– sequence: 3
  givenname: Leilei
  surname: Wang
  fullname: Wang, Leilei
  organization: School of Computer Science and Engineering, Central South University
– sequence: 4
  givenname: Zhihui
  surname: Zhao
  fullname: Zhao, Zhihui
  organization: School of Computer Science and Engineering, Central South University
BookMark eNp9kMtOwzAQRS1UJNrCD7CyxDrgR-w4y6riJRWxANaWk0wql9QutgPq3xMIAolFVzOjuWced4YmzjtA6JySS0pIcRUpI4pnhJGMEKXKjB-hKS25zGQuyOQ3z9kJmsW4IURSLtgUPS1wCn1MGN5N15tkvcNxHxNscWUiNHioA-z6NLYakwy2Dj_4ynaAoVkDrv126Fu3xg7Shw-vp-i4NV2Es584Ry8318_Lu2z1eHu_XKyymtMyZUZVPDcARhWCyRZ4SQxXTDIBTUtFDZxCoaq6UaZpa8lyItsSCt5CI4UpBJ-ji3HuLvi3HmLSG98HN6zULOeyLDgVxaBSo6oOPsYAra7t-E0KxnaaEv1loR4t1IOF-ttCzQeU_UN3wW5N2B-G-AjFQezWEP6uOkB9ApPzhrk
CitedBy_id crossref_primary_10_1109_ACCESS_2024_3429197
crossref_primary_10_1109_ACCESS_2023_3329126
crossref_primary_10_1007_s00521_024_10593_5
crossref_primary_10_1016_j_comcom_2022_07_039
crossref_primary_10_3390_s23125620
crossref_primary_10_1016_j_future_2023_04_004
crossref_primary_10_1016_j_future_2021_05_035
crossref_primary_10_1016_j_future_2022_11_028
crossref_primary_10_1016_j_jnca_2022_103402
crossref_primary_10_1145_3572717
crossref_primary_10_7717_peerj_cs_700
crossref_primary_10_1007_s13369_021_05607_6
crossref_primary_10_1080_10447318_2022_2115639
crossref_primary_10_1109_JIOT_2024_3387448
crossref_primary_10_1016_j_comnet_2024_110197
crossref_primary_10_1109_JIOT_2021_3114438
crossref_primary_10_1109_JIOT_2022_3220840
crossref_primary_10_1109_TVT_2022_3198004
Cites_doi 10.1016/j.comnet.2015.07.011
10.1109/TMM.2018.2889934
10.1109/TKDE.2003.1209003
10.1145/2831347.2831354
10.1109/TPDS.2015.2408613
10.1016/j.jnca.2011.03.028
10.1109/TITS.2015.2494017
10.1016/j.jnca.2014.01.014
10.1109/TMC.2013.2296513
10.1109/TKDE.2004.1318566
10.1145/779928.779972
10.1109/TMC.2019.2901474
10.1145/3341104
10.1007/3-540-58618-0_53
10.1109/JIOT.2018.2842766
10.1145/775152.775242
10.1109/TCC.2019.2923692
10.1109/JIOT.2019.2944889
10.1109/LWC.2018.2799935
10.1109/ACCESS.2017.2769878
10.1109/ACCESS.2019.2952213
10.1109/TCC.2019.2898657
10.1016/S0278-0984(02)11030-3
ContentType Journal Article
Copyright Springer Science+Business Media, LLC, part of Springer Nature 2020
Springer Science+Business Media, LLC, part of Springer Nature 2020.
Copyright_xml – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020
– notice: Springer Science+Business Media, LLC, part of Springer Nature 2020.
DBID AAYXX
CITATION
3V.
7SC
7XB
88I
8AL
8AO
8FD
8FE
8FG
8FK
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
GUQSH
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
M2O
M2P
MBDVC
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOI 10.1007/s12083-020-00889-3
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ProQuest Central (purchase pre-March 2016)
Science Database (Alumni Edition)
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Research Library
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Technology collection
ProQuest One
ProQuest Central
ProQuest Central Student
ProQuest Research Library
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Research Library
Science Database
Research Library (Corporate)
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DatabaseTitle CrossRef
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Pharma Collection
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Research Library
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Science Journals (Alumni Edition)
ProQuest Central Basic
ProQuest Science Journals
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
DatabaseTitleList
Research Library Prep
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1936-6450
EndPage 1755
ExternalDocumentID 10_1007_s12083_020_00889_3
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61772553; 61379058
  funderid: http://dx.doi.org/10.13039/501100001809
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
06D
0R~
0VY
123
1N0
203
29O
29~
2JN
2JY
2KG
2VQ
2~H
30V
3V.
4.4
406
408
409
40D
5VS
67Z
6NX
875
88I
8AO
8FE
8FG
8G5
8TC
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABMNI
ABMQK
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACGOD
ACHSB
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALFXC
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
ANMIH
AOCGG
ARAPS
ARCSS
AUKKA
AXYYD
AYJHY
AZQEC
B-.
BA0
BDATZ
BENPR
BGLVJ
BGNMA
BPHCQ
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DNIVK
DPUIP
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GUQSH
GXS
H13
HCIFZ
HF~
HG5
HG6
HLICF
HMJXF
HQYDN
HRMNR
HZ~
I0C
IJ-
IKXTQ
IWAJR
IXC
IXD
IZIGR
IZQ
I~X
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K6V
K7-
KOV
LLZTM
M0N
M2O
M2P
M4Y
MA-
NPVJJ
NQJWS
NU0
O9-
O93
O9J
OAM
P62
P9P
PQQKQ
PROAC
PT4
Q2X
QOS
R89
RIG
RLLFE
RNS
ROL
RPX
RSV
S16
S1Z
S27
S3B
SAP
SDH
SEG
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
T13
TH9
TSG
TSK
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W48
WK8
YLTOR
Z45
Z7X
Z83
Z88
ZMTXR
~A9
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ACSTC
AEZWR
AFDZB
AFHIU
AFOHR
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
7SC
7XB
8AL
8FD
8FK
ABRTQ
JQ2
L7M
L~C
L~D
MBDVC
PKEHL
PQEST
PQGLB
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c319t-a8b34aeea87526fe390a382625edf15ce31e78bcd8adfc62406f9e73fed65a753
IEDL.DBID AGYKE
ISSN 1936-6442
IngestDate Fri Jul 25 03:14:17 EDT 2025
Tue Jul 01 01:29:12 EDT 2025
Thu Apr 24 22:58:33 EDT 2025
Fri Feb 21 02:34:39 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 5
Keywords Reputation data
Trust evaluation system
Credibility
Mobile edge computing
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-a8b34aeea87526fe390a382625edf15ce31e78bcd8adfc62406f9e73fed65a753
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-7439-7720
PQID 2436973157
PQPubID 54523
PageCount 12
ParticipantIDs proquest_journals_2436973157
crossref_citationtrail_10_1007_s12083_020_00889_3
crossref_primary_10_1007_s12083_020_00889_3
springer_journals_10_1007_s12083_020_00889_3
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20200900
2020-09-00
20200901
PublicationDateYYYYMMDD 2020-09-01
PublicationDate_xml – month: 9
  year: 2020
  text: 20200900
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Norwell
PublicationTitle Peer-to-peer networking and applications
PublicationTitleAbbrev Peer-to-Peer Netw. Appl
PublicationYear 2020
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Li, Song (CR24) 2016; 17
CR19
CR18
CR17
CR16
CR15
CR14
CR13
Wang, Zhang, Zhang, Wang, Yang, Wang (CR3) 2017; 5
CR11
Mrmol, Prez (CR21) 2012; 35
Roman, Lopez, Mambo (CR2) 2016; 78
CR4
Noor, Sheng, Yao (CR26) 2016; 27
CR6
Yan, Zhang, Vasilakos (CR10) 2014; 42
CR5
Mousa, Mokhtar, Hasan (CR28) 2015; 90
CR8
CR7
CR29
CR9
CR27
Damiani, Di Vimercati, Paraboschi (CR20) 2003; 15
CR23
CR22
Tang, Ren, Zhang (CR12) 2019; 21
Li, Chigan (CR25) 2014; 13
Garcia Lopez, Montresor, Epema (CR1) 2015; 45
889_CR29
Z Yan (889_CR10) 2014; 42
W Tang (889_CR12) 2019; 21
889_CR27
889_CR22
H Mousa (889_CR28) 2015; 90
889_CR23
P Garcia Lopez (889_CR1) 2015; 45
E Damiani (889_CR20) 2003; 15
889_CR8
889_CR7
889_CR6
889_CR5
889_CR9
Z Li (889_CR25) 2014; 13
889_CR19
889_CR18
S Wang (889_CR3) 2017; 5
889_CR4
889_CR15
889_CR14
889_CR17
889_CR16
889_CR11
889_CR13
R Roman (889_CR2) 2016; 78
TH Noor (889_CR26) 2016; 27
FG Mrmol (889_CR21) 2012; 35
W Li (889_CR24) 2016; 17
References_xml – volume: 90
  start-page: 49
  year: 2015
  end-page: 73
  ident: CR28
  article-title: Trust management and reputation systems in mobile participatory sensing applications: a survey[J]
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2015.07.011
– ident: CR22
– volume: 21
  start-page: 579
  issue: 3
  year: 2019
  end-page: 590
  ident: CR12
  article-title: Enabling trusted and privacy-preserving healthcare Services in Social Media Health Networks
  publication-title: IEEE Trans Multimedia
  doi: 10.1109/TMM.2018.2889934
– ident: CR18
– ident: CR4
– ident: CR14
– ident: CR16
– volume: 5
  start-page: 67576779
  year: 2017
  ident: CR3
  article-title: A survey on mobile edge networks: convergence of computing, caching and communications
  publication-title: IEEE Access
– volume: 15
  start-page: 840
  issue: 4
  year: 2003
  end-page: 854
  ident: CR20
  article-title: Managing and sharing servants' reputations in P2P systems[J]
  publication-title: IEEE Trans Knowl Data Eng
  doi: 10.1109/TKDE.2003.1209003
– ident: CR6
– ident: CR29
– ident: CR8
– ident: CR27
– ident: CR23
– ident: CR19
– ident: CR15
– ident: CR17
– ident: CR13
– ident: CR11
– ident: CR9
– volume: 45
  start-page: 37
  issue: 5
  year: 2015
  end-page: 42
  ident: CR1
  article-title: Edge-centric computing: vision and challenges[J]
  publication-title: ACM SIGCOMM Computer Communication Review
  doi: 10.1145/2831347.2831354
– volume: 27
  start-page: 367
  issue: 2
  year: 2016
  end-page: 380
  ident: CR26
  article-title: CloudArmor: supporting reputation-based trust management for cloud services[J]
  publication-title: IEEE Trans Parallel Distrib Syst
  doi: 10.1109/TPDS.2015.2408613
– ident: CR5
– ident: CR7
– volume: 35
  start-page: 934
  issue: 3
  year: 2012
  end-page: 941
  ident: CR21
  article-title: TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks[J]
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2011.03.028
– volume: 78
  start-page: 680
  issue: Part 2
  year: 2016
  end-page: 698
  ident: CR2
  article-title: Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges[J]
  publication-title: Futur Gener Comput Syst
– volume: 17
  start-page: 960
  issue: 4
  year: 2016
  end-page: 969
  ident: CR24
  article-title: ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks[J]
  publication-title: IEEE Trans Intell Transp Syst
  doi: 10.1109/TITS.2015.2494017
– volume: 42
  start-page: 120
  issue: 3
  year: 2014
  end-page: 134
  ident: CR10
  article-title: A survey on trust management for internet of things[J]
  publication-title: Journal Netw Comput Appl
  doi: 10.1016/j.jnca.2014.01.014
– volume: 13
  start-page: 2334
  issue: 10
  year: 2014
  end-page: 2344
  ident: CR25
  article-title: On joint privacy and reputation assurance for vehicular ad hoc networks[J]
  publication-title: IEEE Trans Mob Comput
  doi: 10.1109/TMC.2013.2296513
– ident: 889_CR17
  doi: 10.1109/TKDE.2004.1318566
– ident: 889_CR23
– ident: 889_CR18
  doi: 10.1145/779928.779972
– ident: 889_CR6
  doi: 10.1109/TMC.2019.2901474
– volume: 13
  start-page: 2334
  issue: 10
  year: 2014
  ident: 889_CR25
  publication-title: IEEE Trans Mob Comput
  doi: 10.1109/TMC.2013.2296513
– volume: 78
  start-page: 680
  issue: Part 2
  year: 2016
  ident: 889_CR2
  publication-title: Futur Gener Comput Syst
– ident: 889_CR13
  doi: 10.1145/3341104
– volume: 42
  start-page: 120
  issue: 3
  year: 2014
  ident: 889_CR10
  publication-title: Journal Netw Comput Appl
  doi: 10.1016/j.jnca.2014.01.014
– volume: 15
  start-page: 840
  issue: 4
  year: 2003
  ident: 889_CR20
  publication-title: IEEE Trans Knowl Data Eng
  doi: 10.1109/TKDE.2003.1209003
– ident: 889_CR15
  doi: 10.1007/3-540-58618-0_53
– ident: 889_CR11
– ident: 889_CR9
  doi: 10.1109/JIOT.2018.2842766
– volume: 35
  start-page: 934
  issue: 3
  year: 2012
  ident: 889_CR21
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2011.03.028
– volume: 27
  start-page: 367
  issue: 2
  year: 2016
  ident: 889_CR26
  publication-title: IEEE Trans Parallel Distrib Syst
  doi: 10.1109/TPDS.2015.2408613
– ident: 889_CR19
  doi: 10.1145/775152.775242
– ident: 889_CR4
  doi: 10.1109/TCC.2019.2923692
– volume: 17
  start-page: 960
  issue: 4
  year: 2016
  ident: 889_CR24
  publication-title: IEEE Trans Intell Transp Syst
  doi: 10.1109/TITS.2015.2494017
– volume: 5
  start-page: 67576779
  year: 2017
  ident: 889_CR3
  publication-title: IEEE Access
– ident: 889_CR7
  doi: 10.1109/JIOT.2019.2944889
– ident: 889_CR8
  doi: 10.1109/LWC.2018.2799935
– ident: 889_CR22
  doi: 10.1109/ACCESS.2017.2769878
– volume: 90
  start-page: 49
  year: 2015
  ident: 889_CR28
  publication-title: Comput Netw
  doi: 10.1016/j.comnet.2015.07.011
– ident: 889_CR29
  doi: 10.1109/ACCESS.2019.2952213
– ident: 889_CR5
  doi: 10.1109/TCC.2019.2898657
– ident: 889_CR16
– volume: 21
  start-page: 579
  issue: 3
  year: 2019
  ident: 889_CR12
  publication-title: IEEE Trans Multimedia
  doi: 10.1109/TMM.2018.2889934
– volume: 45
  start-page: 37
  issue: 5
  year: 2015
  ident: 889_CR1
  publication-title: ACM SIGCOMM Computer Communication Review
  doi: 10.1145/2831347.2831354
– ident: 889_CR14
– ident: 889_CR27
  doi: 10.1016/S0278-0984(02)11030-3
SSID ssj0061352
Score 2.2890954
Snippet In recent days, Mobile Edge Computing (MEC) emerges as a new computing paradigm that pushes computing resources towards the edge of the Internet and close to...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1744
SubjectTerms Cloud computing
Communications Engineering
Computer Communication Networks
Data management
Edge computing
End users
Engineering
Information Systems and Communication Service
Mobile computing
Networks
Nodes
Reputations
Signal,Image and Speech Processing
Special Issue on Emerging Trends on Data Analytics at the Network Edge
Trustworthiness
Wireless networks
SummonAdditionalLinks – databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8MwDLZgXOCAeIrCQDlwg4g1adP2hCbEmJDGBSbtVqV5SEioG2z8f5w0pYDEjlVbH2zHn504_gAuiyrBpFZaypPM0kQJSwvLDB2k0lhtmVS-5X_yJMbT5HGWzsKG2zK0VbYx0QdqPVduj_yGJVw4mqU0u128U8ca5U5XA4XGJmzFiDTOz_PRQxuJEak84w7mKIIi7rNwaaa5Oscw-aCueBr4Th_-G5i6bPPPAanHndEe7IaEkQwbC-_DhqkPYOfHGMFDeB4Sf3WCdKO7STOhmTiQ0gSfP8ziszl1J64plLzWZDKvMCQQt6FGlCd3QGmkbvrCj2A6un-5G9NAlkAVrqIVlXnFE2mMxAKECWt4MZAcaweWGm3jVBkemyyvlM6ltko4ILeFybg1WqQSi5Zj6NXz2pwAQTGWacwlCsT3SiUYApXItRRWM17ELIK41VSpwiRxR2jxVnYzkJ12S9Ru6bVb8giuvv9ZNHM01n7dbw1QhjW1LDsPiOC6NUr3-n9pp-ulncE2837gGsf60EOLmXPMNFbVhXenL3dVz1w
  priority: 102
  providerName: ProQuest
Title A trust evaluation system based on reputation data in Mobile edge computing network
URI https://link.springer.com/article/10.1007/s12083-020-00889-3
https://www.proquest.com/docview/2436973157
Volume 13
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgXODAGzEeUw7cIGhN2qw9DrQxgTYhYNI4VWkeEgJ1CLYLvx4nbSkgQOJUtU2t1k7sz40fAEdJFiKolZbysGNpqISliWWGtiNprLZMKh_yPxyJwTi8nESTMinstYp2r7Ykvaauk90YwgXq3J22j83hi7AUBXESN2Cpe3F_1as0MFoo32kHsYmgaO9ZmSzzM5WvBqlGmd82Rr296a_BuHrTIszk8XQ-y07V27cijv_9lHVYLQEo6RYzZgMWTL4JK5_KEm7BbZf4VAxSlwInRcVn4oyeJnj-Yp7nxS4-cUGm5CEnw2mGKoa4H3RE-WYRSI3kRZz5Noz7vbvzAS2bL1CFq3JGZZzxUBoj0aFhwhqetCVHX4RFRtsgUoYHphNnSsdSWyUcMLCJ6XBrtIgkOkE70MinudkFgmQs04hNEsQLmQpRpSoRaymsZjwJWBOCSgKpKiuTuwYZT2ldU9kxLEWGpZ5hKW_C8cczz0Vdjj9HH1SCTcs1-pqykAvXuCvqNOGkklN9-3dqe_8bvg_LzIvaBaYdQAMlaA4RycyyFizG_YtWOX3xeNYbXd_g1THrvgOpOuys
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT8MwDLamcQAOiKcYzxzgBBEsadP1gBCPoQ3YhHhI3Eqah4SEuvES4k_xG3HSlgIS3Has2vpgO_aXxPYHsBGnAYJaaSkPIksDJSyNLTN0N5TGasuk8iX_vb7o3ASnt-FtDT7KXhhXVlnGRB-o9UC5M_IdFnDhaJbCaH_4SB1rlLtdLSk0crc4M-9vuGV73useo303GTtpXx91aMEqQBW62wuVrZQH0hiJSJ0Ja3DTLzmCbBYabZuhMrxpolaqdEtqq4TLeDY2EbdGi1BGjiUCQ_5Y4Dpa6zB22O5fXJaxH3Oj5_hBVCQoIg1WtOnkzXoM4Q5127VdX1vEf6bCCt_-upL1me5kGqYKiEoOcp-agZrJZmHy2-DCObg6IL5Zg1TDwkk-E5q4tKgJPj-Z4Wt-z09cGSq5z0hvkGIQIu4IjyhPJ4HSSJZXos_DzUgUuQD1bJCZRSAoxjKN6CVGRJGqAIOuEi0thdWMx03WgGapqUQVs8sdhcZDUk1ddtpNULuJ127CG7D19c8wn9zx79crpQGSYhU_J5XPNWC7NEr1-m9pS_9LW4fxznXvPDnv9s-WYYJ5n3BlaytQR-uZVcQ5L-la4VwE7kbtz59j-g8q
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8RADA6LguhBfOL6nIOedHB3pp22BxFR111fCCp4q9N5gCDd1VXEv-avMzNtrQruzWNpm0OSJl86ST6AzSQLENRKS3kQWRooYWlimaGtUBqrLZPKt_xfXIrubXB6F9414KOahXFtlVVM9IFa95X7R77LAi4czRIW8LZsi7g66uwPnqhjkHInrRWdRuEiZ-b9Dcu34V7vCG29xVjn-OawS0uGAarQ9V6ojDMeSGMkonYmrOFJS3IE3Cw02rZDZXjbRHGmdCy1VcJlP5uYiFujRSgjxxiB4X884lHiCr-4c1JlAcySnu0H8ZGgiDlYObBTjO0xBD7UFW4t32XEfybFGun-Opz1Oa8zA9MlWCUHhXfNQsPkczD1bYXhPFwfED-2Qeq14aTYDk1cgtQEr5_N4LU48SeuIZU85OSin2E4Iu5nHlGeWAKlkbzoSV-A239R4yKM5f3cLAFBMZZpxDEJYotMBRh-lYi1FFYznrRZE9qVplJVbjF3ZBqPab1_2Wk3Re2mXrspb8L21zuDYofHyKdXKwOk5fc8TGvva8JOZZT69t_SlkdL24AJ9OL0vHd5tgKTzLuE619bhTE0nllDwPOSrXvPInD_3678CTHWEfo
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+trust+evaluation+system+based+on+reputation+data+in+Mobile+edge+computing+network&rft.jtitle=Peer-to-peer+networking+and+applications&rft.au=Deng%2C+Xiaoheng&rft.au=Liu%2C+Jin&rft.au=Wang%2C+Leilei&rft.au=Zhao%2C+Zhihui&rft.date=2020-09-01&rft.pub=Springer+US&rft.issn=1936-6442&rft.eissn=1936-6450&rft.volume=13&rft.issue=5&rft.spage=1744&rft.epage=1755&rft_id=info:doi/10.1007%2Fs12083-020-00889-3&rft.externalDocID=10_1007_s12083_020_00889_3
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1936-6442&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1936-6442&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1936-6442&client=summon