DSpace Repository

End User Authentication Method in Mobile Edge Computing

Show simple item record

dc.contributor.author Smita, Sadia Rahman
dc.contributor.author Hossain, Md. Sabbir
dc.date.accessioned 2019-06-22T04:18:21Z
dc.date.available 2019-06-22T04:18:21Z
dc.date.issued 2019-01
dc.identifier.uri http://hdl.handle.net/123456789/2398
dc.description.abstract Mobile Edge Computing (MEC) provides mobile and cloud computing capabilities within the access network, and aims to unite the telco and IT at the mobile network edge. The main feature of MEC is to push mobile computing, network control and storage to the network edges (e.g., base stations and access points) so as to enable computation intensive and latency-critical applications at the resource-limited mobile devices. MEC promises dramatic reduction in latency and mobile energy consumption, tackling the key challenges for materializing 5G vision. A main thrust of MEC research is to seamlessly merge the two disciplines of wireless communications and mobile computing, resulting in a wide-range of new designs ranging from techniques for computation offloading to network architectures. In this report, a secured authentication method is proposed to enhance the security of MEC. en_US
dc.language.iso en_US en_US
dc.publisher Daffodil International University en_US
dc.relation.ispartofseries ;P12981
dc.subject Mobile Edge Computing en_US
dc.subject Secured Authentication Method en_US
dc.title End User Authentication Method in Mobile Edge Computing en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account