Title | Terminal Security Reinforcement Method based on Graph and Potential Function |
Publication Type | Conference Paper |
Year of Publication | 2021 |
Authors | Xu, Aidong, Fei, Lingzhi, Wang, Qianru, Wen, Hong, Wu, Sihui, Wang, Peiyao, Zhang, Yunan, Jiang, Yixin |
Conference Name | 2021 International Conference on Intelligent Computing, Automation and Applications (ICAA) |
Keywords | Automation, Computational modeling, Computing Theory, edge computing, Metrics, pubcrawl, security, security management |
Abstract | By taking advantages of graphs and potential functions, a security reinforcement method for edge computing terminals is proposed in this paper. A risk graph of the terminal security protection system is constructed, and importance of the security protection and risks of the terminals is evaluated according to the topological potential of the graph nodes, and the weak points of the terminal are located, and the corresponding reinforcement method is proposed. The simulation experiment results show that the proposed method can upgrade and strengthen the key security mechanism of the terminal, improve the performance of the terminal security protection system, and is beneficial to the security management of the edge computing system. |
DOI | 10.1109/ICAA53760.2021.00063 |
Citation Key | xu_terminal_2021 |