Delay and energy minimization for MEC-based secure communication
Considering a physical-layer-security-aided confidential document transmission problem,a secure transmission strategy was proposed where the base station equipped with a mobile edge computing (MEC) server served as a relay to help compress,forward,and decompress.First,the Poisson point process was u...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2020-11-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020219/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539269249728512 |
---|---|
author | Pinyi REN Qian XU |
author_facet | Pinyi REN Qian XU |
author_sort | Pinyi REN |
collection | DOAJ |
description | Considering a physical-layer-security-aided confidential document transmission problem,a secure transmission strategy was proposed where the base station equipped with a mobile edge computing (MEC) server served as a relay to help compress,forward,and decompress.First,the Poisson point process was used to calculate the secure transmission probability for the scenario with multiple potential eavesdroppers.Then,a delay and energy minimization problem was formulated under a constraint on the two-hop secure transmission probability.The optimal compression and decompression scheme was obtained using the one-dimensional search combined with linear programming.Simulation results show that the document compression is necessary for the link with small achievable secrecy rate under a given secure transmission probability; otherwise,the document should be directly transmitted without compression. |
format | Article |
id | doaj-art-3df91042394342a9833d90e9e0ac4f88 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2020-11-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-3df91042394342a9833d90e9e0ac4f882025-01-14T07:21:05ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2020-11-0141526359738471Delay and energy minimization for MEC-based secure communicationPinyi RENQian XUConsidering a physical-layer-security-aided confidential document transmission problem,a secure transmission strategy was proposed where the base station equipped with a mobile edge computing (MEC) server served as a relay to help compress,forward,and decompress.First,the Poisson point process was used to calculate the secure transmission probability for the scenario with multiple potential eavesdroppers.Then,a delay and energy minimization problem was formulated under a constraint on the two-hop secure transmission probability.The optimal compression and decompression scheme was obtained using the one-dimensional search combined with linear programming.Simulation results show that the document compression is necessary for the link with small achievable secrecy rate under a given secure transmission probability; otherwise,the document should be directly transmitted without compression.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020219/mobile edge computingphysical layer securitysecure transmission probabilitydelayenergy |
spellingShingle | Pinyi REN Qian XU Delay and energy minimization for MEC-based secure communication Tongxin xuebao mobile edge computing physical layer security secure transmission probability delay energy |
title | Delay and energy minimization for MEC-based secure communication |
title_full | Delay and energy minimization for MEC-based secure communication |
title_fullStr | Delay and energy minimization for MEC-based secure communication |
title_full_unstemmed | Delay and energy minimization for MEC-based secure communication |
title_short | Delay and energy minimization for MEC-based secure communication |
title_sort | delay and energy minimization for mec based secure communication |
topic | mobile edge computing physical layer security secure transmission probability delay energy |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020219/ |
work_keys_str_mv | AT pinyiren delayandenergyminimizationformecbasedsecurecommunication AT qianxu delayandenergyminimizationformecbasedsecurecommunication |