Visible to the public Terminal Security Reinforcement Method based on Graph and Potential Function

TitleTerminal Security Reinforcement Method based on Graph and Potential Function
Publication TypeConference Paper
Year of Publication2021
AuthorsXu, Aidong, Fei, Lingzhi, Wang, Qianru, Wen, Hong, Wu, Sihui, Wang, Peiyao, Zhang, Yunan, Jiang, Yixin
Conference Name2021 International Conference on Intelligent Computing, Automation and Applications (ICAA)
KeywordsAutomation, Computational modeling, Computing Theory, edge computing, Metrics, pubcrawl, security, security management
AbstractBy taking advantages of graphs and potential functions, a security reinforcement method for edge computing terminals is proposed in this paper. A risk graph of the terminal security protection system is constructed, and importance of the security protection and risks of the terminals is evaluated according to the topological potential of the graph nodes, and the weak points of the terminal are located, and the corresponding reinforcement method is proposed. The simulation experiment results show that the proposed method can upgrade and strengthen the key security mechanism of the terminal, improve the performance of the terminal security protection system, and is beneficial to the security management of the edge computing system.
DOI10.1109/ICAA53760.2021.00063
Citation Keyxu_terminal_2021