Secure MISO Cognitive-Based Mobile Edge Computing with Wireless Power Transfer

被引:0
作者
Wang J. [1 ]
Liu B. [1 ]
Feng L. [2 ]
机构
[1] School of Communications and Information Engineering, Xi'an University of Posts and Telecommunications, Xi'an
[2] Guizhou Branch of China Mobile Online Service Company Ltd., Guiyang
来源
IEEE Access | 2020年 / 8卷
关键词
cognitive radio; MISO; Mobile edge computing; physical-layer security; wireless power transfer;
D O I
10.1109/aCCESS.2020.2967221
中图分类号
学科分类号
摘要
The finite battery capacity, limited spectrum resource and the transmission security are three challenges in designing mobile edge computing (MEC) systems. In this paper, a framework for wireless powered secure multiple-input single-output (MISO) cognitive-based MEC-enabled networks is proposed, which integrates several technologies: physical-layer security, cooperative relaying, cognitive radio (CR), wireless power transfer (WPT) and MEC. Two optimization problems are formulated to maximize the number of computation bits (NCB) of the mobile device (MD) and minimize the total transmission power (TTP) of the primary transmitter (PT) and the SBS, respectively. The formulated problems are non-convex and hard to solve. Two two-phase methods with block coordinate decent (BCD) and Lagrangian dual decomposition methods are proposed to jointly design the beamforming vector of the PT, beamforming matrix of the secondary base station (SBS), the central processing unit (CPU) frequency, the transmit power, the number of the offloaded bits and the offloading time of the MD. Simulation results are presented to show the effectiveness of the proposed methods. © 2013 IEEE.
引用
收藏
页码:15518 / 15528
页数:10
相关论文
共 29 条
  • [11] Lin H., Cao Y., Zhong Y., Liu P., Secure computation efficiency maximization in NOMA-enabled mobile edge computing networks, IEEE Access, 7, pp. 87504-87512, (2019)
  • [12] He X., Jin R., Dai H., Physical-layer assisted privacy-preserving of_oading in mobile-edge computing, Proc. IEEE Int. Conf. Commun. (ICC), pp. 1-6, (2019)
  • [13] Wu W., Zhou F., Hu R.Q., Wang B., Energy-efficient resource allocation for secure NOMA-enabled mobile edge computing networks, IEEE Trans. Commun., 68, 1, pp. 493-505, (2020)
  • [14] Xu J., Yao J., Exploiting physical-layer security for multiuser mul-ticarrier computation of_oading, IEEE Wireless Commun. Lett., 8, 1, pp. 9-12, (2019)
  • [15] Zhou F., Li Z., Cheng J., Li Q., Si J., Robust AN-aided beamforming and power splitting design for secure MISO cognitive radio with SWIPT, IEEE Trans. Wireless Commun., 16, 4, pp. 2450-2464, (2017)
  • [16] Mitola J., Maguire G., Cognitive radio: Making software radios more personal, IEEE Pers. Commun., 6, 4, pp. 13-18, (1999)
  • [17] Haykin S., Cognitive radio: Brain-empowered wireless communica-tions, IEEE J. Sel. Areas Commun., 23, 2, pp. 201-220, (2005)
  • [18] Jia F., Zhang H., Ji H., Li X., Distributed resource allocation and computation of_oading scheme for cognitive mobile edge computing net-works with noma, Proc. IEEE/CIC Int. Conf. Commun. China (ICCC), pp. 553-557, (2018)
  • [19] Si P., Liang H., Wu W., Zhang Y., Joint resource management in cognitive radio and edge computing based industrial wireless networks, Proc. IEEE Global Commun. Conf. (GLOBECOM), pp. 1-6, (2017)
  • [20] Liu B., Wang J., Ma S., Zhou F., Ma Y., Lu G., Energy-efficient cooperation in mobile edge computing-enabled cognitive radio networks, IEEE Access, 7, pp. 45382-45394, (2019)