Terminal Security Reinforcement Method based on Graph and Potential Function

Aidong Xu,Lingzhi Fei,Qianru Wang,Hong Wen,Sihui Wu,Peiyao Wang,Yunan Zhang,Yixin Jiang
DOI: https://doi.org/10.1109/ICAA53760.2021.00063
2021-01-01
Abstract:By taking advantages of graphs and potential functions, a security reinforcement method for edge computing terminals is proposed in this paper. A risk graph of the terminal security protection system is constructed, and importance of the security protection and risks of the terminals is evaluated according to the topological potential of the graph nodes, and the weak points of the terminal are loc...
What problem does this paper attempt to address?