Back to Search Start Over

Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers.

Authors :
Lai, Xiazhi
Fan, Lisheng
Lei, Xianfu
Deng, Yansha
Karagiannidis, George K.
Nallanathan, Arumugam
Source :
IEEE Transactions on Communications. Jan2022, Vol. 70 Issue 1, p500-513. 14p.
Publication Year :
2022

Abstract

In this paper, we investigate a secure mobile edge computing (MEC) network in the presence of multiple eavesdroppers, where multiple users can offload parts of their tasks to the computational access point (CAP). The multiple eavesdroppers may overhear the confidential task offloading, which leads to information leakage. In order to address this issue, we present the minimization problem of the secrecy outage probability (SOP), by jointly taking into account the constraints from the latency and energy consumption. With the aim to improve the system secrecy performance, we then introduce three user selection criteria to choose the best user among multiple ones. Specifically, criterion I maximizes the locally computational capacity, while criterion II and III maximize the secrecy capacity and data rate of main links, respectively. For these criteria, we further analyze the system secrecy performance by deriving analytical and asymptotic expressions for the SOP, from which we can conclude important insights for the system design. Finally, simulation and analytical results are provided to verify the proposed analysis. The results show that the three criteria can efficiently safeguard the MEC networks, compared to the traditional local computing and fully offloading, especially with a large value of user number. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
00906778
Volume :
70
Issue :
1
Database :
Academic Search Index
Journal :
IEEE Transactions on Communications
Publication Type :
Academic Journal
Accession number :
154763817
Full Text :
https://doi.org/10.1109/TCOMM.2021.3119075