Satisfaction-Maximized Secure Computation Offloading in Multi-Eavesdropper MEC Networks

نویسندگان

چکیده

In this paper, we consider a mobile edge computing (MEC)-based secure computation offloading system, and design practical multi-eavesdropper model including two specific scenarios of non-colluding colluding eavesdropping. Furthermore, requirement satisfaction by exploring variations in user request patterns for security provisioning, delay reduction energy saving. Based on these, propose satisfaction-maximized (SMax-SCO) scheme, then formulate an optimization problem aiming at maximizing users’ satisfactions subject to secrecy rate, tolerable delay, task workload maximum power constraints. Since the is nonconvex, present efficient successive convex approximation (SCA)-based algorithm obtain suboptimal solutions. We demonstrate that proposed SMax-SCO scheme achieves significant improvement performance compared with existing schemes. Moreover, conclude can resist eavesdropping attacks multiple eavesdroppers even eavesdroppers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Multi-Party Computation over Networks

Consider a set of parties who do not trust each other but want to compute some agreed function of their inputs in a secure way. This problem is known as multi-party computation. It has various interesting applications including election over the internet, electric contracts, private and secret database, joint signatures, and others. A number of techniques for the problem have been proposed. Sec...

متن کامل

Secure Communications in OFDMA networks with active eavesdropper

In this paper, we formulate the resource allocation problem for secure communications in a single cell OFDMA network where a base station wants to communicate to the users which are spread over its coverage area while an adversary is present in the network. In our model, we assume that the adversary s an active attacker which is able to either eavesdrop on the information transmitted over the w...

متن کامل

Semi-Supervised MEC Clustering Algorithm on Maximized Central Distance

In the field of pattern recognition, the traditional supervised learning methods and unsupervised learning methods are not always suitable for the practical applications. In some applications, the data obtained is neither no-information-given nor all-information-given. In addition, the data obtained usually contains some noises due to many interference factors in practical collection procedure ...

متن کامل

Energy-Efficient Joint Offloading and Wireless Resource Allocation Strategy in Multi-MEC Server Systems

Mobile edge computing (MEC) is an emerging paradigm that mobile devices can offload the computationintensive or latency-critical tasks to the nearby MEC servers, so as to save energy and extend battery life. Unlike the cloud server, MEC server is a small-scale data center deployed at a wireless access point, thus it is highly sensitive to both radio and computing resource. In this paper, we con...

متن کامل

On the Location of the Eavesdropper in Multi-Terminal Networks

Abstract We study the optimum location of an eavesdropper from a secrecy capacity perspective in multi-terminal networks with power control. We determine the logical location of an eavesdropper (represented by the channel gain from all the transmitters) which a) results in zero secrecy capacity for maximum number of users in the network and b) results in zero secrecy capacity for the bottle-nec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Wireless Communications

سال: 2021

ISSN: ['1536-1276', '1558-2248']

DOI: https://doi.org/10.1109/twc.2021.3128247