Exploiting Physical-Layer Security for Multiuser Multicarrier Computation Offloading

被引:72
作者
Xu, Jie [1 ]
Yao, Jianping [1 ]
机构
[1] Guangdong Univ Technol, Sch Informat Engn, Guangzhou 510006, Guangdong, Peoples R China
关键词
Mobile edge computing (MEC); multiuser computation offloading; physical-layer security; optimization; MOBILE; COMMUNICATION; OPTIMIZATION;
D O I
10.1109/LWC.2018.2845882
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This letter considers a mobile edge computing system with one access point (AP) serving multiple users over a multicarrier channel, in the presence of a malicious eavesdropper. In this system, each user can execute the respective computation tasks by partitioning them into two parts, which are computed locally and offloaded to AP, respectively. We exploit the physical-layer security to secure the multiuser computation offloading from being overheard by the eavesdropper. Under this setup, we minimize the weighted sum-energy consumption for these users, subject to the newly imposed secrecy offloading rate constraints and the computation latency constraints, by jointly optimizing their computation and communication resource allocations. We propose an efficient algorithm to solve this problem.
引用
收藏
页码:9 / 12
页数:4
相关论文
共 15 条
[1]  
[Anonymous], 2017, 2017 IEEE GLOBECOM W, DOI [DOI 10.1109/GLOCOMW.2017.8269088, 10.1109/VTCSpring.2017.8108670]
[2]   Communicating While Computing [Distributed mobile cloud computing over 5G heterogeneous networks] [J].
Barbarossa, Sergio ;
Sardellitti, Stefania ;
Di Lorenzo, Paolo .
IEEE SIGNAL PROCESSING MAGAZINE, 2014, 31 (06) :45-55
[3]   Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing [J].
Chen, Xu ;
Jiao, Lei ;
Li, Wenzhong ;
Fu, Xiaoming .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (05) :2827-2840
[4]   Constructive Interference Based Secure Precoding: A New Dimension in Physical Layer Security [J].
Khandaker, Muhammad R. A. ;
Masouros, Christos ;
Wong, Kai-Kit .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2256-2268
[5]   Probabilistically Robust SWIPT for Secrecy MISOME Systems [J].
Khandaker, Muhammad R. A. ;
Wong, Kai-Kit ;
Zhang, Yangyang ;
Zheng, Zhongbin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (01) :211-226
[6]  
Liang Y., 2009, EURASIP J WIREL COMM, V2009, P976
[7]   Secure communication over fading channels [J].
Liang, Yingbin ;
Poor, H. Vincent ;
Sharnai , Shlorno .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2470-2492
[8]   A Survey on Mobile Edge Computing: The Communication Perspective [J].
Mao, Yuyi ;
You, Changsheng ;
Zhang, Jun ;
Huang, Kaibin ;
Letaief, Khaled B. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (04) :2322-2358
[9]  
Mukherjee A, 2012, INT CONF ACOUST SPEE, P2809, DOI 10.1109/ICASSP.2012.6288501
[10]   Joint Offloading and Computing Optimization in Wireless Powered Mobile-Edge Computing Systems [J].
Wang, Feng ;
Xu, Jie ;
Wang, Xin ;
Cui, Shuguang .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (03) :1784-1797