浏览全部资源
扫码关注微信
西安交通大学信息与通信工程学院,陕西 西安 710049
[ "任品毅(1971- ),男,湖南长沙人,博士,西安交通大学教授,主要研究方向为无线物理层安全传输、新一代移动通信系统与网络、认知无线网络、卫星通信与组网、信号检测、分布式网络等" ]
[ "许茜(1991- ),女,陕西西安人,西安交通大学博士生,主要研究方向为无线物理层安全传输、大规模天线技术、协作通信等" ]
网络出版日期:2020-11,
纸质出版日期:2020-11-25
移动端阅览
任品毅, 许茜. 基于移动边缘计算的时延能耗最小化安全传输[J]. 通信学报, 2020,41(11):52-63.
Pinyi REN, Qian XU. Delay and energy minimization for MEC-based secure communication[J]. Journal on communications, 2020, 41(11): 52-63.
任品毅, 许茜. 基于移动边缘计算的时延能耗最小化安全传输[J]. 通信学报, 2020,41(11):52-63. DOI: 10.11959/j.issn.1000-436x.2020219.
Pinyi REN, Qian XU. Delay and energy minimization for MEC-based secure communication[J]. Journal on communications, 2020, 41(11): 52-63. DOI: 10.11959/j.issn.1000-436x.2020219.
考虑物理层安全辅助的私密文件传输问题,提出了带有边缘计算服务器的智能基站作为中继协助完成文件压缩、传输与解压的安全传输方案。首先使用空间泊松点过程刻画多个潜在窃听者场景下的安全传输概率,然后构建两跳总安全传输概率约束下的时延及能耗最小化问题。通过一维搜索结合线性规划,得到了最优压缩与解压方案。仿真结果表明,给定安全概率约束下私密信息速率小的链路在传输前需要进行文件压缩,反之不需要压缩,可直接传输。
Considering a physical-layer-security-aided confidential document transmission problem
a secure transmission strategy was proposed where the base station equipped with a mobile edge computing (MEC) server served as a relay to help compress
forward
and decompress.First
the Poisson point process was used to calculate the secure transmission probability for the scenario with multiple potential eavesdroppers.Then
a delay and energy minimization problem was formulated under a constraint on the two-hop secure transmission probability.The optimal compression and decompression scheme was obtained using the one-dimensional search combined with linear programming.Simulation results show that the document compression is necessary for the link with small achievable secrecy rate under a given secure transmission probability; otherwise
the document should be directly transmitted without compression.
KUMAR K , LU Y H . Cloud computing for mobile users:can offloading computation save energy? [J ] . Computer , 2010 , 43 ( 4 ): 51 - 56 .
谢人超 , 廉晓飞 , 贾庆民 , 等 . 移动边缘计算卸载技术综述 [J ] . 通信学报 , 2018 , 39 ( 11 ): 138 - 155 .
XIE R C , LIAN X F , JIA Q M , et al . Survey on computation offloading in mobile edge computing [J ] . Journal on Communications , 2018 , 39 ( 11 ): 138 - 155 .
TRAN T X , HAJISAMI A , PANDEY P , et al . Collaborative mobile edge computing in 5G networks:new paradigms,scenarios,and challenges [J ] . IEEE Communications Magazine , 2017 , 55 ( 4 ): 54 - 61 .
GUO H Z , LIU J J , ZHANG J . Computation offloading for multi-access mobile edge computing in ultra-dense networks [J ] . IEEE Communications Magazine , 2018 , 56 ( 8 ): 14 - 19 .
ZHANG W W , WEN Y G , GUAN K , et al . Energy optimal mobile cloud computing under stochastic wireless channel [J ] . IEEE Transactions on Wireless Communications , 2013 , 12 ( 9 ): 4569 - 4581 .
BI S Z , ZHANG Y J . Computation rate maximization for wireless powered mobile-edge computing with binary computation offloading [J ] . IEEE Transactions on Wireless Communications , 2018 , 17 ( 6 ): 4177 - 4190 .
REN J K , RUAN Y J , YU G D . Data transmission in mobile edge networks:whether and where to compress? [J ] . IEEE Communications Letters , 2019 , 23 ( 3 ): 490 - 493 .
MERLUZZI M , LORENZO P D , BARBAROSSA S , et al . Dynamic computation offloading in multi-access edge computing via ultra-reliable and low-latency communications [J ] . IEEE Transactions on Signal and Information Processing over Networks , 2020 , 6 : 342 - 356 .
ZHANG G L , ZHANG W Q , CAO Y , et al . Energy-delay tradeoff for dynamic offloading in mobile-edge computing system with energy harvesting devices [J ] . IEEE Transactions on Industrial Informatics , 2018 , 14 ( 10 ): 4642 - 4655 .
赵临东 , 庄文芹 , 陈建新 , 等 . 异构蜂窝网络中分层任务卸载:建模与优化 [J ] . 通信学报 , 2020 , 41 ( 4 ): 34 - 44 .
ZHAO L D , ZHUANG W Q , CHEN J X , et al . Hierarchical task offloading in heterogeneous cellular network:modeling and optimization [J ] . Journal on Communications , 2020 , 41 ( 4 ): 34 - 44 .
GRANJAL J , MONTEIRO E , SILVA J S . Security for the Internet of things:a survey of existing protocols and open research issues [J ] . IEEE Communication Surveys & Tutorials , 2015 , 17 ( 3 ): 1294 - 1312 .
MUKHERJEE A , FAKOORIAN S A A , HUANG J , et al . Principles of physical layer security in multiuser wireless networks:a survey [J ] . IEEE Communication Surveys & Tutorials , 2014 , 16 ( 3 ): 1550 - 1573 .
WYNER A D . The wire-tap channel [J ] . Bell System Technical Journal , 1975 , 54 ( 8 ): 1355 - 1387 .
HE X F , JIN R C , DAI H Y . Physical-layer assisted secure offloading in mobile-edge computing [J ] . IEEE Transactions on Wireless Communications , 2020 ,doi:10.1109/TWC.2020.2979456.
XU J , YAO J P . Exploiting physical-layer security for multiuser multicarrier computation offloading [J ] . IEEE Wireless Communications Letters , 2019 , 8 ( 1 ): 9 - 12 .
WU Y , SHI J J , NI K J , et al . Secrecy-based delay-aware computation offloading via mobile edge computing for Internet of things [J ] . IEEE Internet of Things Journal , 2019 , 6 ( 3 ): 4201 - 4213 .
ZHOU Y , PAN C H , YEOH P L , et al . Secure communications for UAV-enabled mobile edge computing systems [J ] . IEEE Transactions on Communications , 2020 , 68 ( 1 ): 376 - 388 .
KOYLUOGLU O.O , KOKSAL C E , GAMAL H E . On secrecy capacity scaling in wireless networks [J ] . IEEE Transactions On Information Theory , 2012 , 58 ( 5 ): 3000 - 3015 .
MO J H , TAO M X , LIU Y . Relay placement for physical layer security:a secure connection perspective [J ] . IEEE Communications Letters , 2012 , 16 ( 6 ): 878 - 881 .
塞西亚 , 陶菲克 , 贝克 . LTE/LTE-advanced:UMTS长期演进理论与实践 [M ] . 马霓,夏斌,译.北京 : 人民邮电出版社 , 2012 .
SESIA S , TOUFZK I , BAKER M . LTE/LTE-advanced—The UMTS long term,evolution:from theory to practice [M ] . MA N,XIA B,transl . Beijing : Posts Telecom PressPress , 2012 .
ZHOU X Y , MCKAY M R , MAHAM B , et al . Rethinking the secrecy outage formulation:a secure transmission design perspective [J ] . IEEE Communications Letters , 2011 , 15 ( 3 ): 302 - 304 .
CHIU S N , STOYAN D , KENDALL W S , et al . Stochastic geometry and its applications [M ] . 3rd edition United Kingdom : John Wiley &Sons Ltd. , 2013 .
XU Q , REN P Y , SONG H B , et al . Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations [J ] . IEEE Access , 2016 , 4 : 2840 - 2853 .
CAI C X , CAI Y M , ZHOU X Y , et al . When does relay transmission give a more secure connection in wireless Ad Hoc networks? [J ] . IEEE Transactions on Information Forensics and Security , 2014 , 9 ( 4 ): 624 - 632 .
LIU L , ZHOU Y Q , YUAN J H , et al . Economically optimal MS association for multimedia content delivery in cache-enabled heterogeneous cloud radio access networks [J ] . IEEE Journal on Selected Areas in Communications , 2019 , 37 ( 7 ): 1584 - 1593 .
LIU L , ZHOU Y Q , Garcia V , et al . Load aware joint CoMP clustering and inter-cell resource scheduling in heterogeneous ultra dense cellular networks [J ] . IEEE Transactions on Vehicular Technology , 2018 , 67 ( 3 ): 2741 - 2755 .
GARCIA V , ZHOU Y Q , SHI J L . Coordinated multipoint transmission in dense cellular networks with user-centric adaptive clustering [J ] . IEEE Transactions on Wireless Communications , 2014 , 13 ( 8 ): 4297 - 4308 .
GRADSHTEYN I S , RYZHIK I M , JEFFREY A , et al . Table of integrals series,and poducts [M ] . 7th ed . New York : AcademicPress , 2007 .
GRANT M , BOYD S . CVX:MATLAB software for disciplined convex programming [J ] . 2011 .
0
浏览量
943
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构