Certificateless Batch Authentication Scheme and Intrusion Detection Model Based on the Mobile Edge Computing Technology NDN-IoT Environment

With the rapid development of mobile communication technology, the data transmission rate of mobile communication has been significantly improved and emerging Internet of things applications need a lot of computing resources to meet their own computing needs. However, the existing intelligent termin...

Full description

Saved in:
Bibliographic Details
Main Author: Jianzhao Sun
Format: Article
Language:English
Published: Wiley 2022-01-01
Series:Journal of Function Spaces
Online Access:http://dx.doi.org/10.1155/2022/5926792
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849396409992740864
author Jianzhao Sun
author_facet Jianzhao Sun
author_sort Jianzhao Sun
collection DOAJ
description With the rapid development of mobile communication technology, the data transmission rate of mobile communication has been significantly improved and emerging Internet of things applications need a lot of computing resources to meet their own computing needs. However, the existing intelligent terminals have limited computing power and cannot meet the low-latency computing requirements with limited energy consumption. Mobile edge computing technology is considered to be one of the technical solutions that can efficiently solve this problem. Through mobile edge computing technology, intelligent terminals can actively divert some computing tasks to the computing servers deployed in edge network nodes and return the computing results to intelligent terminals after the edge computing servers have finished computing, thus greatly reducing the computing delay of users. In this paper, aiming at multiple edge server networks, combined with dual-connection technology, based on the research of a single edge computing server network, it is further extended to two edge computing servers and a joint optimization problem of computing task allocation and security performance requirements of intelligent terminals and edge computing servers is proposed, so as to minimize the global time delay for completing the computing tasks of intelligent terminals. By layering the problem, this paper proposes a corresponding algorithm, which can efficiently obtain the optimal solution of the initial problem. Compared with the linear search algorithm, the algorithm proposed in this paper can significantly reduce the computation time.
format Article
id doaj-art-b2b204741a994ffcb6b812408b8a5826
institution Kabale University
issn 2314-8888
language English
publishDate 2022-01-01
publisher Wiley
record_format Article
series Journal of Function Spaces
spelling doaj-art-b2b204741a994ffcb6b812408b8a58262025-08-20T03:39:21ZengWileyJournal of Function Spaces2314-88882022-01-01202210.1155/2022/5926792Certificateless Batch Authentication Scheme and Intrusion Detection Model Based on the Mobile Edge Computing Technology NDN-IoT EnvironmentJianzhao Sun0School of Computer EngineeringWith the rapid development of mobile communication technology, the data transmission rate of mobile communication has been significantly improved and emerging Internet of things applications need a lot of computing resources to meet their own computing needs. However, the existing intelligent terminals have limited computing power and cannot meet the low-latency computing requirements with limited energy consumption. Mobile edge computing technology is considered to be one of the technical solutions that can efficiently solve this problem. Through mobile edge computing technology, intelligent terminals can actively divert some computing tasks to the computing servers deployed in edge network nodes and return the computing results to intelligent terminals after the edge computing servers have finished computing, thus greatly reducing the computing delay of users. In this paper, aiming at multiple edge server networks, combined with dual-connection technology, based on the research of a single edge computing server network, it is further extended to two edge computing servers and a joint optimization problem of computing task allocation and security performance requirements of intelligent terminals and edge computing servers is proposed, so as to minimize the global time delay for completing the computing tasks of intelligent terminals. By layering the problem, this paper proposes a corresponding algorithm, which can efficiently obtain the optimal solution of the initial problem. Compared with the linear search algorithm, the algorithm proposed in this paper can significantly reduce the computation time.http://dx.doi.org/10.1155/2022/5926792
spellingShingle Jianzhao Sun
Certificateless Batch Authentication Scheme and Intrusion Detection Model Based on the Mobile Edge Computing Technology NDN-IoT Environment
Journal of Function Spaces
title Certificateless Batch Authentication Scheme and Intrusion Detection Model Based on the Mobile Edge Computing Technology NDN-IoT Environment
title_full Certificateless Batch Authentication Scheme and Intrusion Detection Model Based on the Mobile Edge Computing Technology NDN-IoT Environment
title_fullStr Certificateless Batch Authentication Scheme and Intrusion Detection Model Based on the Mobile Edge Computing Technology NDN-IoT Environment
title_full_unstemmed Certificateless Batch Authentication Scheme and Intrusion Detection Model Based on the Mobile Edge Computing Technology NDN-IoT Environment
title_short Certificateless Batch Authentication Scheme and Intrusion Detection Model Based on the Mobile Edge Computing Technology NDN-IoT Environment
title_sort certificateless batch authentication scheme and intrusion detection model based on the mobile edge computing technology ndn iot environment
url http://dx.doi.org/10.1155/2022/5926792
work_keys_str_mv AT jianzhaosun certificatelessbatchauthenticationschemeandintrusiondetectionmodelbasedonthemobileedgecomputingtechnologyndniotenvironment