Status | 已发表Published |
Title | A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks |
Creator | |
Date Issued | 2021-08-01 |
Source Publication | Computer Standards and Interfaces
![]() |
ISSN | 0920-5489 |
Volume | 77 |
Abstract | With the development of Internet of Thing (IoT) joint 5G and Beyond Networks, Mobile Edge Users (MEUs) can act as mobile data collectors to collect data for various applications. However, some malicious MEUs reporting false or malicious data can cause serious harm to applications, especially for ultra-reliable applications. A novel Verifiable Trust Evaluation joint UAV (VTE-UAV) mechanism is proposed to select trustworthy MEUs to conduct the task for ultra-reliable applications. The VTE-UAV strategy adopts two novel trust evaluation methods, one is the aggregation-based MEU trust evaluation mechanism, when malicious evaluation objects are in the minority, the mechanism takes most evaluation results as baseline data. The other is an active trust acquisition mechanism, it takes the data obtained by Unmanned Aerial Vehicles (UAVs) as baseline data to actively validate the authenticity of the data. Through these two cross evaluation strategies, we obtain more accurate trust evaluation results. Finally, this paper transforms the trust evaluation optimization problem into the optimization of the accuracy of trust evaluation with reducing the cloud payment and the dispatch cost of UAVs. Extensive experiments have verified the validity of the VTE-UAV strategy. Compared with the previous strategies, the VTE-UAV improves the cloud recruitment performance by 7.74%-25.91%, increases the accuracy of trust evaluation of IoT devices by 2.24%-11.72%, and reduces the cloud payment and the cost of UAVs by 3.11%-10.20% and 58.23%, respectively. |
Keyword | 5G and beyond networks Baseline data Mobile edge computing Trust and verifiable Ultra-reliable applications |
DOI | 10.1016/j.csi.2021.103519 |
URL | View source |
Indexed By | SCIE |
Language | 英语English |
WOS Research Area | Computer Science |
WOS Subject | Computer Science, Hardware & Architecture ; Computer Science, Software Engineering |
WOS ID | WOS:000652843800005 |
Scopus ID | 2-s2.0-85100784844 |
Citation statistics | |
Document Type | Journal article |
Identifier | http://repository.uic.edu.cn/handle/39GCC9TT/7034 |
Collection | Research outside affiliated institution |
Corresponding Author | Li, Xiong |
Affiliation | 1.School of Computer Science and Engineering, Central South University, Changsha, 410083, China 2.Institute for Cyber Security, School of Computer Science and Engineering,University of Electronic Science and Technology of China, Chengdu, 611731, China 3.College of Computer Science and Technology, Huaqiao University, Xiamen, 361021, China 4.School of Electronic and Information Engineering, South China University of Technology, Guangzhou, 510641, China |
Recommended Citation GB/T 7714 | Ouyang, Yan,Zeng, Zhiwen,Li, Xionget al. A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks[J]. Computer Standards and Interfaces, 2021, 77. |
APA | Ouyang, Yan, Zeng, Zhiwen, Li, Xiong, Wang, Tian, & Liu, Xuxun. (2021). A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks. Computer Standards and Interfaces, 77. |
MLA | Ouyang, Yan,et al."A verifiable trust evaluation mechanism for ultra-reliable applications in 5G and beyond networks". Computer Standards and Interfaces 77(2021). |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment