{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T02:42:12Z","timestamp":1747190532667,"version":"3.40.5"},"reference-count":30,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2018YFB2004200"],"award-info":[{"award-number":["2018YFB2004200"]}]},{"name":"2020 Industrial Internet Innovation and Development Project: \u201cMEC Network Security Protection Technology and Product.\u201d","award":["2018YFB2004200"],"award-info":[{"award-number":["2018YFB2004200"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,7,6]]},"abstract":"<jats:p>Mobile video communication and Internet of Things are playing a more and more important role in our daily life. Mobile Edge Computing (MEC), as the essential network architecture for the Internet, can significantly improve the quality of video streaming applications. The mobile devices transferring video flow are often exposed to hostile environment, where they would be damaged by different attackers. Accordingly, Mobile Edge Computing Network is often vulnerable under disruptions, against either natural disasters or human intentional attacks. Therefore, research on secure hub location in MEC, which could obviously enhance the robustness of the network, is highly invaluable. At present, most of the attacks encountered by edge nodes in MEC in the IoT are random attacks or random failures. According to network science, scale-free networks are more robust than the other types of network under the random failures. In this paper, an optimization algorithm is proposed to reorganize the structure of the network according to the amount of information transmitted between edge nodes. BA networks are more robust under random attacks, while WS networks behave better under human intentional attacks. Therefore, we change the structure of the network accordingly, when the attack type is different. Besides, in the MEC networks for mobile video communication, the capacity of each device and the size of the video data influence the structure significantly. The algorithm sufficiently takes the capability of edge nodes and the amount of the information between them into consideration. In robustness test, we set the number of network nodes to be 200 and 500 and increase the attack scale from 0% to 100% to observe the behaviours of the size of the giant component and the robustness calculated for each attack method. Evaluation results show that the proposed algorithm can significantly improve the robustness of the MEC networks and has good potential to be applied in real-world MEC systems.<\/jats:p>","DOI":"10.1155\/2021\/4539540","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T18:04:15Z","timestamp":1625681055000},"page":"1-12","source":"Crossref","is-referenced-by-count":0,"title":["On Improving the Robustness of MEC with Big Data Analysis for Mobile Video Communication"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3517-8349","authenticated-orcid":true,"given":"Jianming","family":"Zhao","sequence":"first","affiliation":[{"name":"State Key Laboratory of Robotics, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China"},{"name":"Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, Shenyang 110016, China"},{"name":"Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences, Shenyang 110169, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7863-3260","authenticated-orcid":true,"given":"Peng","family":"Zeng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Robotics, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China"},{"name":"Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, Shenyang 110016, China"},{"name":"Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences, Shenyang 110169, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9958-7953","authenticated-orcid":true,"given":"Yingjun","family":"Liu","sequence":"additional","affiliation":[{"name":"Industry Development and Promotion Center, Ministry of Industry and Information Technology of the People\u2019s Republic of China, Beijing 100846, China"}]},{"given":"Tianyu","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Robotics, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China"},{"name":"Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, Shenyang 110016, China"},{"name":"Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences, Shenyang 110169, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2685434"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.2968941"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8267838"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8820507"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.23919\/jcc.2021.01.012"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8823952"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8846239"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6610654"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3427238"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2009.090213"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/35.978050"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/2563917"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.04.012"},{"author":"S. Racz","key":"15","article-title":"Call level performance analysis of 3rd generation mobile core networks"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/5150219"},{"article-title":"Application-network collaboration using SDN for ultra-low delay teleorchestras","author":"E. Lakiotakis","key":"17","doi-asserted-by":"crossref","DOI":"10.1109\/ISCC.2017.8024507"},{"first-page":"271","article-title":"Mobile edge communication an overview of MEC in 5G","author":"B. Priya","key":"18"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2017.1600863"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/cc.2016.7833463"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/cc.2016.7833463"},{"volume-title":"Mobile Edge Computing-A Key Technology Towards 5G","year":"2015","author":"ETSI","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1009440108"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2891505"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2010.03.006"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.056109"},{"issue":"5","key":"27","first-page":"513","article-title":"Overview of network security of cyber-physical systems","volume":"48","author":"D. Ding","year":"2019","journal-title":"Information and Control"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2013.08.047"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.06.151"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.87.198701"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/4539540.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/4539540.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/4539540.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T18:04:28Z","timestamp":1625681068000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/4539540\/"}},"subtitle":[],"editor":[{"given":"Kai","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,7,6]]},"references-count":30,"alternative-id":["4539540","4539540"],"URL":"https:\/\/doi.org\/10.1155\/2021\/4539540","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,7,6]]}}}