dc.contributor.author |
Smita, Sadia Rahman |
|
dc.contributor.author |
Hossain, Md. Sabbir |
|
dc.date.accessioned |
2019-06-22T04:18:21Z |
|
dc.date.available |
2019-06-22T04:18:21Z |
|
dc.date.issued |
2019-01 |
|
dc.identifier.uri |
http://hdl.handle.net/123456789/2398 |
|
dc.description.abstract |
Mobile Edge Computing (MEC) provides mobile and cloud computing capabilities within
the access network, and aims to unite the telco and IT at the mobile network edge. The
main feature of MEC is to push mobile computing, network control and storage to the
network edges (e.g., base stations and access points) so as to enable computation intensive and latency-critical applications at the resource-limited mobile devices. MEC promises dramatic reduction in latency and mobile energy consumption, tackling the key challenges for materializing 5G vision. A main thrust of MEC research is to seamlessly merge the two disciplines of wireless communications and mobile computing, resulting in a wide-range of new designs ranging from techniques for computation offloading to network architectures. In this report, a secured authentication method is proposed to enhance the security of MEC. |
en_US |
dc.language.iso |
en_US |
en_US |
dc.publisher |
Daffodil International University |
en_US |
dc.relation.ispartofseries |
;P12981 |
|
dc.subject |
Mobile Edge Computing |
en_US |
dc.subject |
Secured Authentication Method |
en_US |
dc.title |
End User Authentication Method in Mobile Edge Computing |
en_US |
dc.type |
Thesis |
en_US |