期刊文献+

EdgeKeeper: a trusted edge computing framework for ubiquitous power Internet of Things 被引量:2

原文传递
导出
摘要 Ubiquitous power Internet of Things(IoT)is a smart service system oriented to all aspects of the power system,and has the characteristics of universal interconnection,human-computer interaction,comprehensive state perception,efficient information processing,and other convenient and flexible applications.It has become a hot topic in the field of IoT.We summarize some existing research work on the IoT and edge computing framework.Because it is difficult to meet the requirements of ubiquitous power IoT for edge computing in terms of real time,security,reliability,and business function adaptation using the general edge computing framework software,we propose a trusted edge computing framework,named“EdgeKeeper,”adapting to the ubiquitous power IoT.Several key technologies such as security and trust,quality of service guarantee,application management,and cloud-edge collaboration are desired to meet the needs of the edge computing framework.Experiments comprehensively evaluate EdgeKeeper from the aspects of function,performance,and security.Comparison results show that EdgeKeeper is the most suitable edge computing framework for the electricity IoT.Finally,future directions for research are proposed.
出处 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第3期374-399,共26页 信息与电子工程前沿(英文版)
基金 Project supported by the State Grid Corporation Science and Technology Project,China。
  • 相关文献

参考文献9

二级参考文献58

  • 1薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:60
  • 2周鸣争,楚宁,周涛,强俊.一种基于能量约束的传感器网络动态数据融合算法[J].仪器仪表学报,2007,28(1):172-175. 被引量:13
  • 3王捷民,宋瀚涛,姜少峰,吴正宇.传感器网络中一种能量有效的自适应成簇算法[J].电子测量技术,2007,30(4):209-212. 被引量:4
  • 4AMRITA G, OTI P S. Secure data aggregation using some degree of persistent authentication in sensor networks [ C ]. Mobile and Pervasive Computing , 2008:153-186.
  • 5BAHI J M, GUYEUX C, MAKHOUL A. Efficient and robust secure aggregation of encrypted data in sensor networks [ C ]. Fourth International Conference on Sensor Technologies and Applications,2010:472-477.
  • 6ALBATH J, MADRIA S K. Secure hierarchical data aggregation in wireless sensor networks [ C ]. Proc of the WCNC 2009,2009 : 1-6.
  • 7GIRAO J, WESTHOFF D, SCHNEIDER M. CDA: Concealed data aggregation for reverse muhicast traffic in wireless sensor networks [ C ]. IEEE International Confer- ence on Communications, Washington,2005.
  • 8PRZYDATEK B, SONG D, PERRIG A. SIA : Secure infor- mation aggregation in sensor networks [ C ]. The First ACM Conference on Embedded Networked Systems ( Sen- Sys' 03) , New York,2003:255-265.
  • 9DU W L, DENG J, HAN Y S. A witness-based approach for data fusion assurance wireless sensor networks [ C ]. IEEE Global Telecommunication Conference. Washington,2003,3 : 1435-1439.
  • 10工业无线网络WIA规范,第一部分:用于过程自动化的WIA系统结构与通信规范[S].GB/T26790.1-2011.

共引文献744

同被引文献38

引证文献2

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部