{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T12:08:06Z","timestamp":1718971686852},"reference-count":54,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T00:00:00Z","timestamp":1565827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"Mobile edge computing (MEC) effectively integrates wireless network and Internet technologies and adds computing, storage, and processing functions to the edge of cellular networks. This new network architecture model can deliver services directly from the cloud to the very edge of the network while providing the best efficiency in mobile networks. However, due to the dynamic, open, and collaborative nature of MEC network environments, network security issues have become increasingly complex. Devices cannot easily ensure obtaining satisfactory and safe services because of the numerous, dynamic, and collaborative character of MEC devices and the lack of trust between devices. The trusted cooperative mechanism can help solve this problem. In this paper, we analyze the MEC network structure and device-to-device (D2D) trusted cooperative mechanism and their challenging issues and then discuss and compare different ways to establish the D2D trusted cooperative relationship in MEC, such as social trust, reputation, authentication techniques, and intrusion detection. All these ways focus on enhancing the efficiency, stability, and security of MEC services in presenting trustworthy services.<\/jats:p>","DOI":"10.3390\/info10080259","type":"journal-article","created":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T08:22:54Z","timestamp":1565857374000},"page":"259","source":"Crossref","is-referenced-by-count":4,"title":["Review of the D2D Trusted Cooperative Mechanism in Mobile Edge Computing"],"prefix":"10.3390","volume":"10","author":[{"given":"Jie","family":"Yuan","sequence":"first","affiliation":[{"name":"Key Laboratory of Trustworthy Distributed Computing and Service (Beijing University of Posts and Telecommunications), Ministry of Education, Haidian District, Beijing 100876, China"}]},{"given":"Erxia","family":"Li","sequence":"additional","affiliation":[{"name":"China Electric Power Research Institute, Haidian District, Beijing 100192, China"}]},{"given":"Chaoqun","family":"Kang","sequence":"additional","affiliation":[{"name":"China Electric Power Research Institute, Haidian District, Beijing 100192, China"}]},{"given":"Fangyuan","family":"Chang","sequence":"additional","affiliation":[{"name":"China Electric Power Research Institute, Haidian District, Beijing 100192, China"}]},{"given":"Xiaoyong","family":"Li","sequence":"additional","affiliation":[{"name":"Key Laboratory of Trustworthy Distributed Computing and Service (Beijing University of Posts and Telecommunications), Ministry of Education, Haidian District, Beijing 100876, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,8,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1628","DOI":"10.1109\/COMST.2017.2682318","article-title":"Mobile edge computing: A survey on architecture and computation offloading","volume":"19","author":"Mach","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"3590","DOI":"10.1109\/JSAC.2016.2611964","article-title":"Dynamic computation offloading for mobile-edge computing with energy harvesting devices","volume":"34","author":"Mao","year":"2016","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1109\/JIOT.2017.2750180","article-title":"Mobile edge computing: A survey","volume":"5","author":"Abbas","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Tran, T.X., Hajisami, A., Pandey, P., and Pompili, D. (2016). Collaborative mobile edge computing in 5G networks: New paradigms, scenarios, and challenges. arXiv.","DOI":"10.1109\/MCOM.2017.1600863"},{"key":"ref_5","first-page":"1","article-title":"Mobile edge computing\u2014A key technology towards 5G","volume":"11","author":"Hu","year":"2015","journal-title":"ETSI White Pap."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1109\/MCOM.2017.1600156CM","article-title":"Mobile edge computing empowered fiber-wireless access networks in the 5G era","volume":"55","author":"Rimal","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1109\/CC.2016.7405725","article-title":"Mobile edge computing towards 5G: Vision, recent progress, and open challenges","volume":"13","author":"Yu","year":"2016","journal-title":"China Commun."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1007\/s11036-016-0752-2","article-title":"Introducing mobile edge computing capabilities through distributed 5G cloud enabled small cells","volume":"21","author":"Fajardo","year":"2016","journal-title":"Mob. Netw. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1016\/j.jpdc.2018.06.008","article-title":"Edge server placement in mobile edge computing","volume":"127","author":"Wang","year":"2019","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MCOM.2019.1800637","article-title":"A Social-Driven Edge Computing Architecture for Mobile Crowd Sensing Management","volume":"57","author":"Bellavista","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/MCOM.2019.1800644","article-title":"Stochastic Online Learning for Mobile Edge Computing: Learning from Changes","volume":"57","author":"Cui","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1002\/spe.2642","article-title":"Reducing the network overhead of user mobility\u2013induced virtual machine migration in mobile edge computing","volume":"49","author":"Zhang","year":"2019","journal-title":"Softw. Pract. Exp."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","article-title":"Edge computing: Vision and challenges","volume":"3","author":"Shi","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2322","DOI":"10.1109\/COMST.2017.2745201","article-title":"A Survey on Mobile Edge Computing: The Communication Perspective","volume":"19","author":"Mao","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.simpat.2014.07.001","article-title":"Network-centric performance analysis of runtime application migration in mobile cloud computing","volume":"50","author":"Ahmed","year":"2015","journal-title":"Simul. Model. Pract. Theory"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1109\/TII.2018.2843169","article-title":"An Edge-based Architecture to Support Efficient Applications for Healthcare Industry 4.0","volume":"15","author":"Pace","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.future.2019.02.050","article-title":"Edge computing: A survey","volume":"97","author":"Wazir","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Habak, K., Zegura, E.W., Ammar, M., and Harras, K.A. (2017, January 12\u201314). Workload management for dynamic mobile device clusters in edge femtoclouds. Proceedings of the Second ACM\/IEEE Symposium on Edge Computing, San Jose\/Fremont, CA, USA.","DOI":"10.1145\/3132211.3134455"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Habak, K., Ammar, M., Harras, K.A., and Zegura, E. (July, January 27). Femto Clouds: Leveraging Mobile Devices to Provide Cloud Service at the Edge. Proceedings of the 2015 IEEE 8th International Conference on Cloud Computing, New York, NY, USA.","DOI":"10.1109\/CLOUD.2015.12"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MWC.2018.1700274","article-title":"Secure Social Networks in 5G Systems with Mobile Edge Computing, Caching, and Device-to-Device Communications","volume":"25","author":"He","year":"2018","journal-title":"IEEE Wirel. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Yuan, J., and Li, X. (2018, January 15\u201319). A multi-source feedback based trust calculation mechanism for edge computing. Proceedings of the IEEE INFOCOM 2018\u2014IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Honolulu, HI, USA.","DOI":"10.1109\/INFCOMW.2018.8406900"},{"key":"ref_22","unstructured":"Mtibaa, A., Harras, K., and Alnuweiri, H. (December, January 30). Friend or Foe Detecting and Isolating Malicious Nodes in Mobile Edge Computing Platforms. Proceedings of the IEEE 7th International Conference on Cloud Computing Technology & Science, Vancouver, BC, Canada."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Vassilakis, V., Chochliouros, I.P., Spiliopoulou, A.S., Sfakianakis, E., Belesioti, M., Bompetsis, N., and Wilson, M. (2016, January 16\u201318). Security analysis of mobile edge computing in virtualized small cell networks. Proceedings of the IFIP International Conference on Artificial Intelligence Applications and Innovations, Thessaloniki, Greece.","DOI":"10.1007\/978-3-319-44944-9_58"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MCOM.2018.1701132","article-title":"Security in the internet of things supported by mobile edge computing","volume":"56","author":"He","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2991","DOI":"10.1002\/cpe.3485","article-title":"An overview of fog computing and its security issues","volume":"28","author":"Stojmenovic","year":"2016","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MNET.2018.1700344","article-title":"Blockchain-enabled security in electric vehicles cloud and edge computing","volume":"32","author":"Liu","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.jnca.2017.02.001","article-title":"Security and privacy challenges in mobile cloud computing: Survey and way ahead","volume":"84","author":"Mollah","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"25408","DOI":"10.1109\/ACCESS.2017.2769878","article-title":"Distributed reputation management for secure and efficient vehicular edge computing and networks","volume":"5","author":"Huang","year":"2017","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","article-title":"Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges","volume":"78","author":"Roman","year":"2016","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/s11235-009-9263-9","article-title":"Feedback behavior and its role in trust assessment for peer-to-peer systems","volume":"44","author":"Azzedin","year":"2010","journal-title":"Telecommun. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1419","DOI":"10.1109\/TPDS.2014.2321750","article-title":"Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds","volume":"26","author":"Li","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1402","DOI":"10.1109\/TIFS.2015.2413386","article-title":"T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services","volume":"10","author":"Li","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1917","DOI":"10.1109\/TIFS.2018.2806925","article-title":"Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service","volume":"13","author":"Li","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"23626","DOI":"10.1109\/ACCESS.2018.2831898","article-title":"A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion","volume":"6","author":"Yuan","year":"2018","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Yuan, J., and Li, X. (2018, January 25\u201328). A Broker-Guided Trust Calculation Model for Mobile Devices of D2D Communications. Proceedings of the 2018 IEEE Symposium on Computers and Communications (ISCC), Natal, Brazil.","DOI":"10.1109\/ISCC.2018.8538561"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"74579","DOI":"10.1109\/ACCESS.2018.2884002","article-title":"Dynamic Trustworthiness Overlapping Community Discovery in Mobile Internet of Things","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1016\/j.jpdc.2011.01.007","article-title":"A multi-dimensional trust evaluation model for large-scale P2P computing","volume":"71","author":"Li","year":"2011","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1510","DOI":"10.1360\/jos181510","article-title":"Research on dynamic trust model for large scale distributed environment","volume":"18","author":"Li","year":"2007","journal-title":"J. Softw."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1944","DOI":"10.1109\/TPDS.2012.26","article-title":"Scalable feedback aggregating (SFA) overlay for large-scale P2P trust management","volume":"23","author":"Li","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","article-title":"Security, privacy and trust in Internet of Things: The road ahead","volume":"76","author":"Sicari","year":"2015","journal-title":"Comput. Netw."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1109\/TITS.2018.2818888","article-title":"A survey on recent advances in vehicular network security, trust, and privacy","volume":"20","author":"Lu","year":"2018","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Tang, J., Ibrahim, M., Chakrabarty, K., and Karri, R. (2020). Security and Trust, Secure and Trustworthy Cyberphysical Microfluidic Biochips, Springer. Unpublished.","DOI":"10.1007\/978-3-030-18163-5"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Tokekar, V., and Shrivastava, S. (2018). Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks. Information and Communication Technology, Springer.","DOI":"10.1007\/978-981-10-5508-9_4"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2017.12.005","article-title":"MATEM: A unified framework based on trust and MCDM for assuring security, reliability and QoS in DTN routing","volume":"104","author":"Paul","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_45","unstructured":"Tewari, A., and Gupta, B.B. (2018). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Gener. Comput. Syst., in press."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.tibtech.2017.10.012","article-title":"Cyberbiosecurity: From naive trust to risk awareness","volume":"36","author":"Peccoud","year":"2018","journal-title":"Trends Biotechnol."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1109\/JSAC.2016.2525418","article-title":"Internet of Things in the 5G Era: Enablers, Architecture and Business Models","volume":"34","author":"Palattella","year":"2016","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"6757","DOI":"10.1109\/ACCESS.2017.2685434","article-title":"A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications","volume":"5","author":"Wang","year":"2017","journal-title":"IEEE Access"},{"key":"ref_49","unstructured":"Nathan, C. (2019, May 21). What Is Multi-access Edge Computing?. Available online: https:\/\/www.rcrwireless.com\/20170707\/wireless\/what-is-mobile-edge-computing-tag27."},{"key":"ref_50","first-page":"371","article-title":"Review of Trust Models in Wireless Sensor Networks","volume":"8","author":"Rani","year":"2014","journal-title":"Int. Sch. Sci. Res. Innov."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Echeverra, S., Klinedinst, D., Williams, K., and Lewis, G.A. (2016, January 27\u201328). Establishing Trusted Identities in Disconnected edge environment. Proceedings of the 2016 IEEE\/ACM Symposium on Edge Computing (SEC), Washington, DC, USA.","DOI":"10.1109\/SEC.2016.27"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TITS.2018.2827460","article-title":"An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks","volume":"20","author":"Cui","year":"2018","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.datak.2005.05.003","article-title":"Three Architectures for Trusted Data Dissemination in Edge Computing","volume":"58","author":"Goh","year":"2006","journal-title":"Data Knowl. Eng."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.jpdc.2018.03.006","article-title":"A scalable distributed machine learning approach for attack detection in edge computing environments","volume":"119","author":"Kozik","year":"2018","journal-title":"J. Parallel Distrib. Comput."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/8\/259\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T21:33:33Z","timestamp":1718832813000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/10\/8\/259"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,15]]},"references-count":54,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2019,8]]}},"alternative-id":["info10080259"],"URL":"https:\/\/doi.org\/10.3390\/info10080259","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,15]]}}}