Secure MISO Cognitive-Based Mobile Edge Computing with Wireless Power Transfer

被引:0
作者
Wang J. [1 ]
Liu B. [1 ]
Feng L. [2 ]
机构
[1] School of Communications and Information Engineering, Xi'an University of Posts and Telecommunications, Xi'an
[2] Guizhou Branch of China Mobile Online Service Company Ltd., Guiyang
来源
IEEE Access | 2020年 / 8卷
关键词
cognitive radio; MISO; Mobile edge computing; physical-layer security; wireless power transfer;
D O I
10.1109/aCCESS.2020.2967221
中图分类号
学科分类号
摘要
The finite battery capacity, limited spectrum resource and the transmission security are three challenges in designing mobile edge computing (MEC) systems. In this paper, a framework for wireless powered secure multiple-input single-output (MISO) cognitive-based MEC-enabled networks is proposed, which integrates several technologies: physical-layer security, cooperative relaying, cognitive radio (CR), wireless power transfer (WPT) and MEC. Two optimization problems are formulated to maximize the number of computation bits (NCB) of the mobile device (MD) and minimize the total transmission power (TTP) of the primary transmitter (PT) and the SBS, respectively. The formulated problems are non-convex and hard to solve. Two two-phase methods with block coordinate decent (BCD) and Lagrangian dual decomposition methods are proposed to jointly design the beamforming vector of the PT, beamforming matrix of the secondary base station (SBS), the central processing unit (CPU) frequency, the transmit power, the number of the offloaded bits and the offloading time of the MD. Simulation results are presented to show the effectiveness of the proposed methods. © 2013 IEEE.
引用
收藏
页码:15518 / 15528
页数:10
相关论文
共 29 条
  • [1] Tran T.X., Pompili D., Joint task of_oading and resource allocation for multi-server mobile-edge computing networks, IEEE Trans. Veh. Technol., 68, 1, pp. 856-868, (2019)
  • [2] Bi S., Zhang R., Placement optimization of energy and information access points in wireless powered communication networks, IEEE Trans. Wireless Commun., 15, 3, pp. 2351-2364, (2016)
  • [3] Hu X., Wong K.-K., Yang K., Wireless powered cooperation-assisted mobile edge computing, IEEE Trans. Wireless Commun., 17, 4, pp. 2375-2388, (2018)
  • [4] Bi S., Zhang Y.J., Computation rate maximization for wireless powered mobile-edge computing with binary computation of_oading, IEEE Trans. Wireless Commun., 17, 6, pp. 4177-4190, (2018)
  • [5] Wang F., Xu J., Wang X., Cui S., Joint of_oading and computing optimization in wireless powered mobile-edge computing systems, IEEE Trans. Wireless Commun., 17, 3, pp. 1784-1797, (2018)
  • [6] Zhou F., Wu Y., Hu R.Q., Qian Y., Computation rate maximization in UAV-enabled wireless-powered mobile-edge computing systems, IEEE J. Sel. Areas Commun., 36, 9, pp. 1927-1941, (2018)
  • [7] Sun H., Zhou F., Hu R.Q., Hanzo L., Robust beamforming design in a NOMA cognitive radio network relying on SWIPT, IEEE J. Sel. Areas Commun., 37, 1, pp. 142-155, (2019)
  • [8] Zou Y., Zhu J., Wang X., Leung V., Improving physical-layer secu-rity in wireless communications using diversity techniques, IEEE Netw., 29, 1, pp. 42-48, (2015)
  • [9] Hong Y.-W.-P., Lan P.-C., Kuo C.-C.-J., Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal process-ing approaches, IEEE Signal Process. Mag., 30, 5, pp. 29-40, (2013)
  • [10] Wang D., Bai B., Lei K., Zhao W., Yang Y., Han Z., Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city, IEEE Access, 7, pp. 54508-54521, (2019)