Details of Research Outputs

Status已发表Published
TitleA verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks
Creator
Date Issued2021-08-01
Source PublicationComputer Standards and Interfaces
ISSN0920-5489
Volume77
Abstract

With the development of Internet of Thing (IoT) joint 5G and Beyond Networks, Mobile Edge Users (MEUs) can act as mobile data collectors to collect data for various applications. However, some malicious MEUs reporting false or malicious data can cause serious harm to applications, especially for ultra-reliable applications. A novel Verifiable Trust Evaluation joint UAV (VTE-UAV) mechanism is proposed to select trustworthy MEUs to conduct the task for ultra-reliable applications. The VTE-UAV strategy adopts two novel trust evaluation methods, one is the aggregation-based MEU trust evaluation mechanism, when malicious evaluation objects are in the minority, the mechanism takes most evaluation results as baseline data. The other is an active trust acquisition mechanism, it takes the data obtained by Unmanned Aerial Vehicles (UAVs) as baseline data to actively validate the authenticity of the data. Through these two cross evaluation strategies, we obtain more accurate trust evaluation results. Finally, this paper transforms the trust evaluation optimization problem into the optimization of the accuracy of trust evaluation with reducing the cloud payment and the dispatch cost of UAVs. Extensive experiments have verified the validity of the VTE-UAV strategy. Compared with the previous strategies, the VTE-UAV improves the cloud recruitment performance by 7.74%-25.91%, increases the accuracy of trust evaluation of IoT devices by 2.24%-11.72%, and reduces the cloud payment and the cost of UAVs by 3.11%-10.20% and 58.23%, respectively.

Keyword5G and beyond networks Baseline data Mobile edge computing Trust and verifiable Ultra-reliable applications
DOI10.1016/j.csi.2021.103519
URLView source
Indexed BySCIE
Language英语English
WOS Research AreaComputer Science
WOS SubjectComputer Science, Hardware & Architecture ; Computer Science, Software Engineering
WOS IDWOS:000652843800005
Scopus ID2-s2.0-85100784844
Citation statistics
Cited Times:23[WOS]   [WOS Record]     [Related Records in WOS]
Document TypeJournal article
Identifierhttp://repository.uic.edu.cn/handle/39GCC9TT/7034
CollectionResearch outside affiliated institution
Corresponding AuthorLi, Xiong
Affiliation
1.School of Computer Science and Engineering, Central South University, Changsha, 410083, China
2.Institute for Cyber Security, School of Computer Science and Engineering,University of Electronic Science and Technology of China, Chengdu, 611731, China
3.College of Computer Science and Technology, Huaqiao University, Xiamen, 361021, China
4.School of Electronic and Information Engineering, South China University of Technology, Guangzhou, 510641, China
Recommended Citation
GB/T 7714
Ouyang, Yan,Zeng, Zhiwen,Li, Xionget al. A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks[J]. Computer Standards and Interfaces, 2021, 77.
APA Ouyang, Yan, Zeng, Zhiwen, Li, Xiong, Wang, Tian, & Liu, Xuxun. (2021). A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks. Computer Standards and Interfaces, 77.
MLA Ouyang, Yan,et al."A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks". Computer Standards and Interfaces 77(2021).
Files in This Item:
There are no files associated with this item.
Related Services
Usage statistics
Google Scholar
Similar articles in Google Scholar
[Ouyang, Yan]'s Articles
[Zeng, Zhiwen]'s Articles
[Li, Xiong]'s Articles
Baidu academic
Similar articles in Baidu academic
[Ouyang, Yan]'s Articles
[Zeng, Zhiwen]'s Articles
[Li, Xiong]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Ouyang, Yan]'s Articles
[Zeng, Zhiwen]'s Articles
[Li, Xiong]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.