A trust evaluation system based on reputation data in Mobile edge computing network
In recent days, Mobile Edge Computing (MEC) emerges as a new computing paradigm that pushes computing resources towards the edge of the Internet and close to end users and more scholars begin to carry out their different kinds of research under the framework of edge computing. Unlike cloud computing...
Saved in:
| Published in | Peer-to-peer networking and applications Vol. 13; no. 5; pp. 1744 - 1755 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
Springer US
01.09.2020
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1936-6442 1936-6450 |
| DOI | 10.1007/s12083-020-00889-3 |
Cover
| Abstract | In recent days, Mobile Edge Computing (MEC) emerges as a new computing paradigm that pushes computing resources towards the edge of the Internet and close to end users and more scholars begin to carry out their different kinds of research under the framework of edge computing. Unlike cloud computing however, edge computing often lacks a centralized security mechanism, which increases the security risks of resource consumers. Therefore, to address security issues for facilitating MEC well, we focus on the establishment of an effective trust evaluation system in this paper. We presented a Reputation-based Trust Evaluation and Management (RTEM) system for a secure and efficient MEC network, wherein the edge servers are adopted to execute reputation data management for mobile edge nodes. In this system, a three-tier trust evaluation framework (identity trust, capability trust, behavior trust) was proposed to ensure the edge nodes that join the network system for service interaction are qualified, capable, and reliable. In order to update and calculate reputation data more accurately, we designed a reputation-based trust evaluation model and evaluated the effectiveness and robustness of our designed model on the OMNeT++ platform. The results show that our proposed mechanism can increase the transaction success rate of the edge network by more than two times compared with the network without trust evaluation mechanism, and perform better than the traditional subject logic (TSL) trust evalaution mechanism. |
|---|---|
| AbstractList | In recent days, Mobile Edge Computing (MEC) emerges as a new computing paradigm that pushes computing resources towards the edge of the Internet and close to end users and more scholars begin to carry out their different kinds of research under the framework of edge computing. Unlike cloud computing however, edge computing often lacks a centralized security mechanism, which increases the security risks of resource consumers. Therefore, to address security issues for facilitating MEC well, we focus on the establishment of an effective trust evaluation system in this paper. We presented a Reputation-based Trust Evaluation and Management (RTEM) system for a secure and efficient MEC network, wherein the edge servers are adopted to execute reputation data management for mobile edge nodes. In this system, a three-tier trust evaluation framework (identity trust, capability trust, behavior trust) was proposed to ensure the edge nodes that join the network system for service interaction are qualified, capable, and reliable. In order to update and calculate reputation data more accurately, we designed a reputation-based trust evaluation model and evaluated the effectiveness and robustness of our designed model on the OMNeT++ platform. The results show that our proposed mechanism can increase the transaction success rate of the edge network by more than two times compared with the network without trust evaluation mechanism, and perform better than the traditional subject logic (TSL) trust evalaution mechanism. |
| Author | Deng, Xiaoheng Liu, Jin Wang, Leilei Zhao, Zhihui |
| Author_xml | – sequence: 1 givenname: Xiaoheng orcidid: 0000-0002-7439-7720 surname: Deng fullname: Deng, Xiaoheng email: dxh@csu.edu.cn organization: School of Computer Science and Engineering, Central South University – sequence: 2 givenname: Jin surname: Liu fullname: Liu, Jin organization: School of Computer Science and Engineering, Central South University – sequence: 3 givenname: Leilei surname: Wang fullname: Wang, Leilei organization: School of Computer Science and Engineering, Central South University – sequence: 4 givenname: Zhihui surname: Zhao fullname: Zhao, Zhihui organization: School of Computer Science and Engineering, Central South University |
| BookMark | eNp9kMtOwzAQRS1UJNrCD7CyxDrgR-w4y6riJRWxANaWk0wql9QutgPq3xMIAolFVzOjuWced4YmzjtA6JySS0pIcRUpI4pnhJGMEKXKjB-hKS25zGQuyOQ3z9kJmsW4IURSLtgUPS1wCn1MGN5N15tkvcNxHxNscWUiNHioA-z6NLYakwy2Dj_4ynaAoVkDrv126Fu3xg7Shw-vp-i4NV2Es584Ry8318_Lu2z1eHu_XKyymtMyZUZVPDcARhWCyRZ4SQxXTDIBTUtFDZxCoaq6UaZpa8lyItsSCt5CI4UpBJ-ji3HuLvi3HmLSG98HN6zULOeyLDgVxaBSo6oOPsYAra7t-E0KxnaaEv1loR4t1IOF-ttCzQeU_UN3wW5N2B-G-AjFQezWEP6uOkB9ApPzhrk |
| CitedBy_id | crossref_primary_10_1109_ACCESS_2024_3429197 crossref_primary_10_1109_ACCESS_2023_3329126 crossref_primary_10_1007_s00521_024_10593_5 crossref_primary_10_1016_j_comcom_2022_07_039 crossref_primary_10_3390_s23125620 crossref_primary_10_1016_j_future_2023_04_004 crossref_primary_10_1016_j_future_2021_05_035 crossref_primary_10_1016_j_future_2022_11_028 crossref_primary_10_1016_j_jnca_2022_103402 crossref_primary_10_1145_3572717 crossref_primary_10_7717_peerj_cs_700 crossref_primary_10_1007_s13369_021_05607_6 crossref_primary_10_1080_10447318_2022_2115639 crossref_primary_10_1109_JIOT_2024_3387448 crossref_primary_10_1016_j_comnet_2024_110197 crossref_primary_10_1109_JIOT_2021_3114438 crossref_primary_10_1109_JIOT_2022_3220840 crossref_primary_10_1109_TVT_2022_3198004 |
| Cites_doi | 10.1016/j.comnet.2015.07.011 10.1109/TMM.2018.2889934 10.1109/TKDE.2003.1209003 10.1145/2831347.2831354 10.1109/TPDS.2015.2408613 10.1016/j.jnca.2011.03.028 10.1109/TITS.2015.2494017 10.1016/j.jnca.2014.01.014 10.1109/TMC.2013.2296513 10.1109/TKDE.2004.1318566 10.1145/779928.779972 10.1109/TMC.2019.2901474 10.1145/3341104 10.1007/3-540-58618-0_53 10.1109/JIOT.2018.2842766 10.1145/775152.775242 10.1109/TCC.2019.2923692 10.1109/JIOT.2019.2944889 10.1109/LWC.2018.2799935 10.1109/ACCESS.2017.2769878 10.1109/ACCESS.2019.2952213 10.1109/TCC.2019.2898657 10.1016/S0278-0984(02)11030-3 |
| ContentType | Journal Article |
| Copyright | Springer Science+Business Media, LLC, part of Springer Nature 2020 Springer Science+Business Media, LLC, part of Springer Nature 2020. |
| Copyright_xml | – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020 – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020. |
| DBID | AAYXX CITATION 3V. 7SC 7XB 88I 8AL 8AO 8FD 8FE 8FG 8FK 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ GUQSH HCIFZ JQ2 K7- L7M L~C L~D M0N M2O M2P MBDVC P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U |
| DOI | 10.1007/s12083-020-00889-3 |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ProQuest Central (purchase pre-March 2016) Science Database (Alumni Edition) Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Research Library ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology collection ProQuest One ProQuest Central ProQuest Central Student ProQuest Research Library SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Research Library Science Database Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic |
| DatabaseTitle | CrossRef Research Library Prep Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Pharma Collection ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Research Library ProQuest Central (New) Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Science Journals (Alumni Edition) ProQuest Central Basic ProQuest Science Journals ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
| DatabaseTitleList | Research Library Prep |
| Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1936-6450 |
| EndPage | 1755 |
| ExternalDocumentID | 10_1007_s12083_020_00889_3 |
| GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61772553; 61379058 funderid: http://dx.doi.org/10.13039/501100001809 |
| GroupedDBID | -5B -5G -BR -EM -Y2 -~C .4S .86 .DC 06D 0R~ 0VY 123 1N0 203 29O 29~ 2JN 2JY 2KG 2VQ 2~H 30V 3V. 4.4 406 408 409 40D 5VS 67Z 6NX 875 88I 8AO 8FE 8FG 8G5 8TC 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBXA ABDZT ABECU ABFTD ABFTV ABHQN ABJNI ABJOX ABKCH ABMNI ABMQK ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACGOD ACHSB ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQEE AGQMX AGRTI AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALFXC ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR ANMIH AOCGG ARAPS ARCSS AUKKA AXYYD AYJHY AZQEC B-. BA0 BDATZ BENPR BGLVJ BGNMA BPHCQ CAG CCPQU COF CS3 CSCUP DDRTE DNIVK DPUIP DWQXO EBLON EBS EIOEI EJD ESBYG FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GUQSH GXS H13 HCIFZ HF~ HG5 HG6 HLICF HMJXF HQYDN HRMNR HZ~ I0C IJ- IKXTQ IWAJR IXC IXD IZIGR IZQ I~X J-C J0Z JBSCW JCJTX JZLTJ K6V K7- KOV LLZTM M0N M2O M2P M4Y MA- NPVJJ NQJWS NU0 O9- O93 O9J OAM P62 P9P PQQKQ PROAC PT4 Q2X QOS R89 RIG RLLFE RNS ROL RPX RSV S16 S1Z S27 S3B SAP SDH SEG SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE T13 TH9 TSG TSK TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W48 WK8 YLTOR Z45 Z7X Z83 Z88 ZMTXR ~A9 AAPKM AAYXX ABBRH ABDBE ABFSG ACSTC AEZWR AFDZB AFHIU AFOHR AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT 7SC 7XB 8AL 8FD 8FK ABRTQ JQ2 L7M L~C L~D MBDVC PKEHL PQEST PQGLB PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c319t-a8b34aeea87526fe390a382625edf15ce31e78bcd8adfc62406f9e73fed65a753 |
| IEDL.DBID | AGYKE |
| ISSN | 1936-6442 |
| IngestDate | Fri Jul 25 03:14:17 EDT 2025 Tue Jul 01 01:29:12 EDT 2025 Thu Apr 24 22:58:33 EDT 2025 Fri Feb 21 02:34:39 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 5 |
| Keywords | Reputation data Trust evaluation system Credibility Mobile edge computing |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c319t-a8b34aeea87526fe390a382625edf15ce31e78bcd8adfc62406f9e73fed65a753 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-7439-7720 |
| PQID | 2436973157 |
| PQPubID | 54523 |
| PageCount | 12 |
| ParticipantIDs | proquest_journals_2436973157 crossref_citationtrail_10_1007_s12083_020_00889_3 crossref_primary_10_1007_s12083_020_00889_3 springer_journals_10_1007_s12083_020_00889_3 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20200900 2020-09-00 20200901 |
| PublicationDateYYYYMMDD | 2020-09-01 |
| PublicationDate_xml | – month: 9 year: 2020 text: 20200900 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York – name: Norwell |
| PublicationTitle | Peer-to-peer networking and applications |
| PublicationTitleAbbrev | Peer-to-Peer Netw. Appl |
| PublicationYear | 2020 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | Li, Song (CR24) 2016; 17 CR19 CR18 CR17 CR16 CR15 CR14 CR13 Wang, Zhang, Zhang, Wang, Yang, Wang (CR3) 2017; 5 CR11 Mrmol, Prez (CR21) 2012; 35 Roman, Lopez, Mambo (CR2) 2016; 78 CR4 Noor, Sheng, Yao (CR26) 2016; 27 CR6 Yan, Zhang, Vasilakos (CR10) 2014; 42 CR5 Mousa, Mokhtar, Hasan (CR28) 2015; 90 CR8 CR7 CR29 CR9 CR27 Damiani, Di Vimercati, Paraboschi (CR20) 2003; 15 CR23 CR22 Tang, Ren, Zhang (CR12) 2019; 21 Li, Chigan (CR25) 2014; 13 Garcia Lopez, Montresor, Epema (CR1) 2015; 45 889_CR29 Z Yan (889_CR10) 2014; 42 W Tang (889_CR12) 2019; 21 889_CR27 889_CR22 H Mousa (889_CR28) 2015; 90 889_CR23 P Garcia Lopez (889_CR1) 2015; 45 E Damiani (889_CR20) 2003; 15 889_CR8 889_CR7 889_CR6 889_CR5 889_CR9 Z Li (889_CR25) 2014; 13 889_CR19 889_CR18 S Wang (889_CR3) 2017; 5 889_CR4 889_CR15 889_CR14 889_CR17 889_CR16 889_CR11 889_CR13 R Roman (889_CR2) 2016; 78 TH Noor (889_CR26) 2016; 27 FG Mrmol (889_CR21) 2012; 35 W Li (889_CR24) 2016; 17 |
| References_xml | – volume: 90 start-page: 49 year: 2015 end-page: 73 ident: CR28 article-title: Trust management and reputation systems in mobile participatory sensing applications: a survey[J] publication-title: Comput Netw doi: 10.1016/j.comnet.2015.07.011 – ident: CR22 – volume: 21 start-page: 579 issue: 3 year: 2019 end-page: 590 ident: CR12 article-title: Enabling trusted and privacy-preserving healthcare Services in Social Media Health Networks publication-title: IEEE Trans Multimedia doi: 10.1109/TMM.2018.2889934 – ident: CR18 – ident: CR4 – ident: CR14 – ident: CR16 – volume: 5 start-page: 67576779 year: 2017 ident: CR3 article-title: A survey on mobile edge networks: convergence of computing, caching and communications publication-title: IEEE Access – volume: 15 start-page: 840 issue: 4 year: 2003 end-page: 854 ident: CR20 article-title: Managing and sharing servants' reputations in P2P systems[J] publication-title: IEEE Trans Knowl Data Eng doi: 10.1109/TKDE.2003.1209003 – ident: CR6 – ident: CR29 – ident: CR8 – ident: CR27 – ident: CR23 – ident: CR19 – ident: CR15 – ident: CR17 – ident: CR13 – ident: CR11 – ident: CR9 – volume: 45 start-page: 37 issue: 5 year: 2015 end-page: 42 ident: CR1 article-title: Edge-centric computing: vision and challenges[J] publication-title: ACM SIGCOMM Computer Communication Review doi: 10.1145/2831347.2831354 – volume: 27 start-page: 367 issue: 2 year: 2016 end-page: 380 ident: CR26 article-title: CloudArmor: supporting reputation-based trust management for cloud services[J] publication-title: IEEE Trans Parallel Distrib Syst doi: 10.1109/TPDS.2015.2408613 – ident: CR5 – ident: CR7 – volume: 35 start-page: 934 issue: 3 year: 2012 end-page: 941 ident: CR21 article-title: TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks[J] publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2011.03.028 – volume: 78 start-page: 680 issue: Part 2 year: 2016 end-page: 698 ident: CR2 article-title: Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges[J] publication-title: Futur Gener Comput Syst – volume: 17 start-page: 960 issue: 4 year: 2016 end-page: 969 ident: CR24 article-title: ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks[J] publication-title: IEEE Trans Intell Transp Syst doi: 10.1109/TITS.2015.2494017 – volume: 42 start-page: 120 issue: 3 year: 2014 end-page: 134 ident: CR10 article-title: A survey on trust management for internet of things[J] publication-title: Journal Netw Comput Appl doi: 10.1016/j.jnca.2014.01.014 – volume: 13 start-page: 2334 issue: 10 year: 2014 end-page: 2344 ident: CR25 article-title: On joint privacy and reputation assurance for vehicular ad hoc networks[J] publication-title: IEEE Trans Mob Comput doi: 10.1109/TMC.2013.2296513 – ident: 889_CR17 doi: 10.1109/TKDE.2004.1318566 – ident: 889_CR23 – ident: 889_CR18 doi: 10.1145/779928.779972 – ident: 889_CR6 doi: 10.1109/TMC.2019.2901474 – volume: 13 start-page: 2334 issue: 10 year: 2014 ident: 889_CR25 publication-title: IEEE Trans Mob Comput doi: 10.1109/TMC.2013.2296513 – volume: 78 start-page: 680 issue: Part 2 year: 2016 ident: 889_CR2 publication-title: Futur Gener Comput Syst – ident: 889_CR13 doi: 10.1145/3341104 – volume: 42 start-page: 120 issue: 3 year: 2014 ident: 889_CR10 publication-title: Journal Netw Comput Appl doi: 10.1016/j.jnca.2014.01.014 – volume: 15 start-page: 840 issue: 4 year: 2003 ident: 889_CR20 publication-title: IEEE Trans Knowl Data Eng doi: 10.1109/TKDE.2003.1209003 – ident: 889_CR15 doi: 10.1007/3-540-58618-0_53 – ident: 889_CR11 – ident: 889_CR9 doi: 10.1109/JIOT.2018.2842766 – volume: 35 start-page: 934 issue: 3 year: 2012 ident: 889_CR21 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2011.03.028 – volume: 27 start-page: 367 issue: 2 year: 2016 ident: 889_CR26 publication-title: IEEE Trans Parallel Distrib Syst doi: 10.1109/TPDS.2015.2408613 – ident: 889_CR19 doi: 10.1145/775152.775242 – ident: 889_CR4 doi: 10.1109/TCC.2019.2923692 – volume: 17 start-page: 960 issue: 4 year: 2016 ident: 889_CR24 publication-title: IEEE Trans Intell Transp Syst doi: 10.1109/TITS.2015.2494017 – volume: 5 start-page: 67576779 year: 2017 ident: 889_CR3 publication-title: IEEE Access – ident: 889_CR7 doi: 10.1109/JIOT.2019.2944889 – ident: 889_CR8 doi: 10.1109/LWC.2018.2799935 – ident: 889_CR22 doi: 10.1109/ACCESS.2017.2769878 – volume: 90 start-page: 49 year: 2015 ident: 889_CR28 publication-title: Comput Netw doi: 10.1016/j.comnet.2015.07.011 – ident: 889_CR29 doi: 10.1109/ACCESS.2019.2952213 – ident: 889_CR5 doi: 10.1109/TCC.2019.2898657 – ident: 889_CR16 – volume: 21 start-page: 579 issue: 3 year: 2019 ident: 889_CR12 publication-title: IEEE Trans Multimedia doi: 10.1109/TMM.2018.2889934 – volume: 45 start-page: 37 issue: 5 year: 2015 ident: 889_CR1 publication-title: ACM SIGCOMM Computer Communication Review doi: 10.1145/2831347.2831354 – ident: 889_CR14 – ident: 889_CR27 doi: 10.1016/S0278-0984(02)11030-3 |
| SSID | ssj0061352 |
| Score | 2.2890954 |
| Snippet | In recent days, Mobile Edge Computing (MEC) emerges as a new computing paradigm that pushes computing resources towards the edge of the Internet and close to... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1744 |
| SubjectTerms | Cloud computing Communications Engineering Computer Communication Networks Data management Edge computing End users Engineering Information Systems and Communication Service Mobile computing Networks Nodes Reputations Signal,Image and Speech Processing Special Issue on Emerging Trends on Data Analytics at the Network Edge Trustworthiness Wireless networks |
| SummonAdditionalLinks | – databaseName: ProQuest Technology Collection dbid: 8FG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8MwDLZgXOCAeIrCQDlwg4g1adP2hCbEmJDGBSbtVqV5SEioG2z8f5w0pYDEjlVbH2zHn504_gAuiyrBpFZaypPM0kQJSwvLDB2k0lhtmVS-5X_yJMbT5HGWzsKG2zK0VbYx0QdqPVduj_yGJVw4mqU0u128U8ca5U5XA4XGJmzFiDTOz_PRQxuJEak84w7mKIIi7rNwaaa5Oscw-aCueBr4Th_-G5i6bPPPAanHndEe7IaEkQwbC-_DhqkPYOfHGMFDeB4Sf3WCdKO7STOhmTiQ0gSfP8ziszl1J64plLzWZDKvMCQQt6FGlCd3QGmkbvrCj2A6un-5G9NAlkAVrqIVlXnFE2mMxAKECWt4MZAcaweWGm3jVBkemyyvlM6ltko4ILeFybg1WqQSi5Zj6NXz2pwAQTGWacwlCsT3SiUYApXItRRWM17ELIK41VSpwiRxR2jxVnYzkJ12S9Ru6bVb8giuvv9ZNHM01n7dbw1QhjW1LDsPiOC6NUr3-n9pp-ulncE2837gGsf60EOLmXPMNFbVhXenL3dVz1w priority: 102 providerName: ProQuest |
| Title | A trust evaluation system based on reputation data in Mobile edge computing network |
| URI | https://link.springer.com/article/10.1007/s12083-020-00889-3 https://www.proquest.com/docview/2436973157 |
| Volume | 13 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgXODAGzEeUw7cIGhN2qw9DrQxgTYhYNI4VWkeEgJ1CLYLvx4nbSkgQOJUtU2t1k7sz40fAEdJFiKolZbysGNpqISliWWGtiNprLZMKh_yPxyJwTi8nESTMinstYp2r7Ykvaauk90YwgXq3J22j83hi7AUBXESN2Cpe3F_1as0MFoo32kHsYmgaO9ZmSzzM5WvBqlGmd82Rr296a_BuHrTIszk8XQ-y07V27cijv_9lHVYLQEo6RYzZgMWTL4JK5_KEm7BbZf4VAxSlwInRcVn4oyeJnj-Yp7nxS4-cUGm5CEnw2mGKoa4H3RE-WYRSI3kRZz5Noz7vbvzAS2bL1CFq3JGZZzxUBoj0aFhwhqetCVHX4RFRtsgUoYHphNnSsdSWyUcMLCJ6XBrtIgkOkE70MinudkFgmQs04hNEsQLmQpRpSoRaymsZjwJWBOCSgKpKiuTuwYZT2ldU9kxLEWGpZ5hKW_C8cczz0Vdjj9HH1SCTcs1-pqykAvXuCvqNOGkklN9-3dqe_8bvg_LzIvaBaYdQAMlaA4RycyyFizG_YtWOX3xeNYbXd_g1THrvgOpOuys |
| linkProvider | Springer Nature |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT8MwDLamcQAOiKcYzxzgBBEsadP1gBCPoQ3YhHhI3Eqah4SEuvES4k_xG3HSlgIS3Has2vpgO_aXxPYHsBGnAYJaaSkPIksDJSyNLTN0N5TGasuk8iX_vb7o3ASnt-FtDT7KXhhXVlnGRB-o9UC5M_IdFnDhaJbCaH_4SB1rlLtdLSk0crc4M-9vuGV73useo303GTtpXx91aMEqQBW62wuVrZQH0hiJSJ0Ja3DTLzmCbBYabZuhMrxpolaqdEtqq4TLeDY2EbdGi1BGjiUCQ_5Y4Dpa6zB22O5fXJaxH3Oj5_hBVCQoIg1WtOnkzXoM4Q5127VdX1vEf6bCCt_-upL1me5kGqYKiEoOcp-agZrJZmHy2-DCObg6IL5Zg1TDwkk-E5q4tKgJPj-Z4Wt-z09cGSq5z0hvkGIQIu4IjyhPJ4HSSJZXos_DzUgUuQD1bJCZRSAoxjKN6CVGRJGqAIOuEi0thdWMx03WgGapqUQVs8sdhcZDUk1ddtpNULuJ127CG7D19c8wn9zx79crpQGSYhU_J5XPNWC7NEr1-m9pS_9LW4fxznXvPDnv9s-WYYJ5n3BlaytQR-uZVcQ5L-la4VwE7kbtz59j-g8q |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8RADA6LguhBfOL6nIOedHB3pp22BxFR111fCCp4q9N5gCDd1VXEv-avMzNtrQruzWNpm0OSJl86ST6AzSQLENRKS3kQWRooYWlimaGtUBqrLZPKt_xfXIrubXB6F9414KOahXFtlVVM9IFa95X7R77LAi4czRIW8LZsi7g66uwPnqhjkHInrRWdRuEiZ-b9Dcu34V7vCG29xVjn-OawS0uGAarQ9V6ojDMeSGMkonYmrOFJS3IE3Cw02rZDZXjbRHGmdCy1VcJlP5uYiFujRSgjxxiB4X884lHiCr-4c1JlAcySnu0H8ZGgiDlYObBTjO0xBD7UFW4t32XEfybFGun-Opz1Oa8zA9MlWCUHhXfNQsPkczD1bYXhPFwfED-2Qeq14aTYDk1cgtQEr5_N4LU48SeuIZU85OSin2E4Iu5nHlGeWAKlkbzoSV-A239R4yKM5f3cLAFBMZZpxDEJYotMBRh-lYi1FFYznrRZE9qVplJVbjF3ZBqPab1_2Wk3Re2mXrspb8L21zuDYofHyKdXKwOk5fc8TGvva8JOZZT69t_SlkdL24AJ9OL0vHd5tgKTzLuE619bhTE0nllDwPOSrXvPInD_3678CTHWEfo |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+trust+evaluation+system+based+on+reputation+data+in+Mobile+edge+computing+network&rft.jtitle=Peer-to-peer+networking+and+applications&rft.au=Deng%2C+Xiaoheng&rft.au=Liu%2C+Jin&rft.au=Wang%2C+Leilei&rft.au=Zhao%2C+Zhihui&rft.date=2020-09-01&rft.pub=Springer+US&rft.issn=1936-6442&rft.eissn=1936-6450&rft.volume=13&rft.issue=5&rft.spage=1744&rft.epage=1755&rft_id=info:doi/10.1007%2Fs12083-020-00889-3&rft.externalDocID=10_1007_s12083_020_00889_3 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1936-6442&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1936-6442&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1936-6442&client=summon |