Visible to the public Research on Edge Network Security Technology Based on DHR

TitleResearch on Edge Network Security Technology Based on DHR
Publication TypeConference Paper
Year of Publication2022
AuthorsTang, Muyi
Conference Name2022 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA)
Keywordsactive defense, composability, Computational modeling, DHR, dynamic networks, edge computing, electrical engineering, Heuristic algorithms, maintenance engineering, Metrics, Multi-access Edge Computing, Network security, pubcrawl, Redundancy, resilience, Resiliency, security
AbstractThis paper examines how the extent of the network has expanded from the traditional computer Internet to the field of edge computing based on mobile communication technology with the in-depth development of the mobile Internet and the Internet of Things. In particular, the introduction of 5G has enabled massive edge computing nodes to build a high-performance, energy-efficient and low-latency mobile edge computing architecture. Traditional network security technologies and methods are not fully applicable in this environment. The focus of this paper is on security protection for edge networks. Using virtualized networks builds a dynamic heterogeneous redundancy security model (i.e., DHR). It first designs and evaluates the DHR security model, then constructs the required virtualized heterogeneous entity set, and finally constructs a DHR-based active defense scheme. Compared with existing network security solutions, the security protection technology of the edge network studied this time has a better protective effect against the unknown security threats facing the edge network.
DOI10.1109/AEECA55500.2022.9918839
Citation Keytang_research_2022