Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication security level and resource optimization method for computing offload in edge computing network

An edge computing and computing offloading technology, applied in the field of communications, can solve the problems of expensive security, occupying idle bandwidth resources, and large transmission packets, and achieve the effect of saving energy consumption

Active Publication Date: 2022-07-15
XIDIAN UNIV +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) The security of the existing technology is expensive and requires a lot of extra consumption, and the security implementation process has both necessary software and equipment costs, as well as computing power, delay and energy consumption
[0008] (2) The signature digest attached to the original data makes the transmission packet larger and occupies idle bandwidth resources
[0010] The difficulty in solving the above problems and defects is as follows: in the case of edge computing network dynamics, heterogeneity, and limited computing and communication resources, it is difficult to measure the security level of authentication. Facing different opponents in different scenarios, using different authentication algorithms may lead to With completely different authentication security protection strengths, it is difficult to adaptively select edge servers with different authentication security strengths for offloading tasks according to the status quo of resources owned by devices and users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication security level and resource optimization method for computing offload in edge computing network
  • Authentication security level and resource optimization method for computing offload in edge computing network
  • Authentication security level and resource optimization method for computing offload in edge computing network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0087] In view of the problems existing in the prior art, the present invention provides an authentication security level and resource optimization method for computing offload in an edge computing network. The present invention is described in detail below with reference to the accompanying drawings.

[0088] like figure 1 As shown, the authentication security level and resource optimization method for computing offload in an edge computing network provided by the embodiment of the present invention includes the following steps:

[0089] S101, initialize the edge computing frequency and the number of data blocks ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of communication, and discloses an authentication security level and resource optimization method for computing offload in an edge computing network, including: initializing the edge computing frequency and the number of data blocks of a Merkle signature tree, setting the maximum iteration number and precision; Calculate the frequency and the number of data blocks to get the offload indication and transmission rate; get the edge computing frequency according to the offload indication, transmission rate and the number of data blocks; get the number of data blocks according to the offload indication, transmission rate and edge computing frequency; The target value is obtained from the edge computing frequency and the number of data blocks; whether to cycle or not is determined according to the maximum number of iterations and the precision of the target value, and the optimal offloading instruction, transmission rate, edge computing frequency and number of data blocks are obtained. Compared with other schemes, the algorithm proposed in the present invention has significant performance advantages, and indeed provides a trade-off between the time delay of computing offload in the edge computing network and the authentication security level.

Description

technical field [0001] The invention belongs to the field of communication technologies, and in particular relates to an authentication security level and a resource optimization method for computing offloading in an edge computing network. Background technique [0002] Currently, as the fifth generation (5G) technology enters the final commercial stage, both academia and industry are focusing on the research and development of the next generation wireless cellular network (6G). With the rapid development of hardware infrastructure, intelligent algorithms and communication technologies, intelligent terminals are widely deployed near users. Emerging applications and services such as autonomous driving, telemedicine and augmented / virtual reality have gradually permeated the daily life of the present invention. They bring exponentially increased traffic loads and stringent service requirements (eg, high reliability and latency sensitivity). Mobile devices with limited power c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L9/32G06F9/50
CPCH04W12/06H04L9/3247G06F9/5072G06F9/5094G06F2209/502G06F2209/509
Inventor 裴庆祺肖慧子冯杰刘雷卫佳
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products