Back to Search Start Over

An optimization scheme of data link security transmission based on mobile edge computing.

Authors :
Zhang, Han
Xue, Jianbin
Guan, Xiangrui
Ma, Zerou
Xu, Jialing
Source :
Ad Hoc Networks; Sep2024, Vol. 162, pN.PAG-N.PAG, 1p
Publication Year :
2024

Abstract

• Chiming in at the advent of 6 G, communication security is increasingly taken into account. • Use efficient iterative method to optimize the variables that affect the cost. • In order to cut system costs down, we propose an interference power price control algorithm based on simulated annealing algorithm, which prioritizes ground users based on this mechanism. • We have innovatively utilized idle roadside units by collaborating with ground users to interfere with eavesdroppers eavesdropping on data, thereby improving the security of the data transmission link. • Ensure that safety performance is maximized in the case of the highest group interest. For the past few years, the security of data transmission links has been increasingly valued. However, with the increasing requirements for the security performance of data transmission links, how to cut the cost of upgrading while improving security has become a serious challenge. In response to the issue of ensuring low-cost and secure data transmission in wireless communication environments with eavesdroppers, this article innovatively starts with idle roadside units and studies how to incentivize roadside units to transmit interference power to interfere with eavesdroppers, thereby efficiently and economically improving the security performance of mobile user data transmission. Firstly, the impact of roadside unit transmission interference power on the security performance of data transmission links was analyzed by establishing a theoretical model; Then, this paper proposes a three-layer model consisting of ground user groups, eavesdropping users, roadside units, and UAVs equipped with mobile edge computing servers. In this model, by encouraging idle roadside units to send interference power, ground users are assisted to safely unload their own data to mobile edge computing servers. Meanwhile, considering the selfishness of idle roadside units, an improved algorithm based on simulated annealing algorithm is proposed to achieve the optimal mapping between ground users and idle roadside units. Finally, through the analysis of simulation results, this scheme can achieve the goal of reducing system costs while improving the security of data transmission. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
15708705
Volume :
162
Database :
Supplemental Index
Journal :
Ad Hoc Networks
Publication Type :
Academic Journal
Accession number :
177880254
Full Text :
https://doi.org/10.1016/j.adhoc.2024.103556