JOURNAL ARTICLE

DTC: A Dynamic Trusted Collaboration Architecture for Mobile Edge Computing

Abstract

Under mobile edge computing (MEC), collaborative computing is a new paradigm to optimize edge network load and server resource allocation. However, there are still issues such as resource imbalance and unreliable identity when collaborative nodes provide computing and caching services for computing devices. Therefore, an efficient and reliable MEC network should be established to manage these challenges. In this paper, a dynamic trusted collaboration scheme is proposed. Specifically, the transaction supervision of nodes in the MEC scenario is first realized through blockchain-based mobile edge computing (BMEC) technology. In BMEC, a management scheme is established laying the foundation for building a trusted MEC environment. Second, a collaborative model is designed. On this basis, it is formulated as an optimization problem based on computing, communication, caching, and energy consumption. The formulation problem is verified to be NP complete. Thus, an improved heuristic algorithm is adopted in this study to solve this problem. Ultimately, the experimental results demonstrate that DTC not only has good performance but also can effectively enhance the reliability of the MEC network compared with other cooperative schemes.

Keywords:
Computer science Mobile edge computing Distributed computing Trusted Computing Edge computing Computer network Enhanced Data Rates for GSM Evolution Reliability (semiconductor) Scheme (mathematics) Trusted Network Connect Mobile computing Heuristic Database transaction Ubiquitous computing Resource allocation Ant colony optimization algorithms Energy consumption Server Computer security Operating system Engineering

Metrics

5
Cited By
1.07
FWCI (Field Weighted Citation Impact)
14
Refs
0.71
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

IoT and Edge/Fog Computing
Physical Sciences →  Computer Science →  Computer Networks and Communications
Blockchain Technology Applications and Security
Physical Sciences →  Computer Science →  Information Systems
Visual Attention and Saliency Detection
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

BOOK-CHAPTER

Trusted Orchestrator Architecture in Mobile Edge Cloud Computing

Van Thanh Le

Communications in computer and information science Year: 2021 Pages: 121-132
JOURNAL ARTICLE

Distributed Blockchain-Based Trusted Multidomain Collaboration for Mobile Edge Computing in 5G and Beyond

Hui YangYongshen LiangJiaqi YuanQiuyan YaoAo YuJie Zhang

Journal:   IEEE Transactions on Industrial Informatics Year: 2020 Vol: 16 (11)Pages: 7094-7104
BOOK-CHAPTER

Trusted Computing for Collaboration

Joerg AbendrothHolger Kinkelin

Advances in information security, privacy, and ethics book series Year: 2010 Pages: 204-215
© 2026 ScienceGate Book Chapters — All rights reserved.