Delay and energy minimization for MEC-based secure communication

Considering a physical-layer-security-aided confidential document transmission problem,a secure transmission strategy was proposed where the base station equipped with a mobile edge computing (MEC) server served as a relay to help compress,forward,and decompress.First,the Poisson point process was u...

Full description

Saved in:
Bibliographic Details
Main Authors: Pinyi REN, Qian XU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2020-11-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020219/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539269249728512
author Pinyi REN
Qian XU
author_facet Pinyi REN
Qian XU
author_sort Pinyi REN
collection DOAJ
description Considering a physical-layer-security-aided confidential document transmission problem,a secure transmission strategy was proposed where the base station equipped with a mobile edge computing (MEC) server served as a relay to help compress,forward,and decompress.First,the Poisson point process was used to calculate the secure transmission probability for the scenario with multiple potential eavesdroppers.Then,a delay and energy minimization problem was formulated under a constraint on the two-hop secure transmission probability.The optimal compression and decompression scheme was obtained using the one-dimensional search combined with linear programming.Simulation results show that the document compression is necessary for the link with small achievable secrecy rate under a given secure transmission probability; otherwise,the document should be directly transmitted without compression.
format Article
id doaj-art-3df91042394342a9833d90e9e0ac4f88
institution Kabale University
issn 1000-436X
language zho
publishDate 2020-11-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-3df91042394342a9833d90e9e0ac4f882025-01-14T07:21:05ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2020-11-0141526359738471Delay and energy minimization for MEC-based secure communicationPinyi RENQian XUConsidering a physical-layer-security-aided confidential document transmission problem,a secure transmission strategy was proposed where the base station equipped with a mobile edge computing (MEC) server served as a relay to help compress,forward,and decompress.First,the Poisson point process was used to calculate the secure transmission probability for the scenario with multiple potential eavesdroppers.Then,a delay and energy minimization problem was formulated under a constraint on the two-hop secure transmission probability.The optimal compression and decompression scheme was obtained using the one-dimensional search combined with linear programming.Simulation results show that the document compression is necessary for the link with small achievable secrecy rate under a given secure transmission probability; otherwise,the document should be directly transmitted without compression.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020219/mobile edge computingphysical layer securitysecure transmission probabilitydelayenergy
spellingShingle Pinyi REN
Qian XU
Delay and energy minimization for MEC-based secure communication
Tongxin xuebao
mobile edge computing
physical layer security
secure transmission probability
delay
energy
title Delay and energy minimization for MEC-based secure communication
title_full Delay and energy minimization for MEC-based secure communication
title_fullStr Delay and energy minimization for MEC-based secure communication
title_full_unstemmed Delay and energy minimization for MEC-based secure communication
title_short Delay and energy minimization for MEC-based secure communication
title_sort delay and energy minimization for mec based secure communication
topic mobile edge computing
physical layer security
secure transmission probability
delay
energy
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020219/
work_keys_str_mv AT pinyiren delayandenergyminimizationformecbasedsecurecommunication
AT qianxu delayandenergyminimizationformecbasedsecurecommunication