392 research outputs found

    Robust Secure Wireless Powered MISO Cognitive Mobile Edge Computing

    Get PDF
    Wireless power transfer (WPT) and cognitive radio (CR) are two promising techniques in designing mobile-edge computing (MEC) systems. In this paper, we study a robust secure wireless powered multiple-input single-output (MISO) cognitive MEC system, which integrates several techniques: physical-layer security, WPT, CR, underlay spectrum sharing and MEC. Three optimization problems are formulated to minimize the total transmission power (TTP) of the primary transmitter (PT) and the secondary base station (SBS) under perfect channel state information (CSI) model, bounded CSI error model and the probabilistic CSI error model, respectively. The formulated problems are nonconvex and hard to solve. Three two-phase iterative optimization algorithms combined with Lagrangian dual, semidefinite relaxation (SDR), S-Procedure and Bernstein-type inequalities are proposed to jointly optimize the beamforming vectors of the PT and the SBS, the central processing unit (CPU) frequency and the transmit power of the MD. Simulation results are provided to verify the effectiveness of the proposed algorithms

    Efficient and Secure Resource Allocation in Mobile Edge Computing Enabled Wireless Networks

    Get PDF
    To support emerging applications such as autonomous vehicles and smart homes and to build an intelligent society, the next-generation internet of things (IoT) is calling for up to 50 billion devices connected world wide. Massive devices connection, explosive data circulation, and colossal data processing demand are driving both the industry and academia to explore new solutions. Uploading this vast amount of data to the cloud center for processing will significantly increase the load on backbone networks and cause relatively long latency to time-sensitive applications. A practical solution is to deploy the computing resource closer to end-users to process the distributed data. Hence, Mobile Edge Computing (MEC) emerged as a promising solution to providing high-speed data processing service with low latency. However, the implementation of MEC networks is handicapped by various challenges. For one thing, to serve massive IoT devices, dense deployment of edge servers will consume much more energy. For another, uploading sensitive user data through a wireless link intro-duces potential risks, especially for those size-limited IoT devices that cannot implement complicated encryption techniques. This dissertation investigates problems related to Energy Efficiency (EE) and Physical Layer Security (PLS) in MEC-enabled IoT networks and how Non-Orthogonal Multiple Access (NOMA), prediction-based server coordination, and Intelligent Reflecting Surface (IRS) can be used to mitigate them. Employing a new spectrum access method can help achieve greater speed with less power consumption, therefore increasing system EE. We first investigated NOMA-assisted MEC networks and verified that the EE performance could be significantly improved. Idle servers can consume unnecessary power. Proactive server coordination can help relieve the tension of increased energy consumption in MEC systems. Our next step was to employ advanced machine learning algorithms to predict data workload at the server end and adaptively adjust the system configuration over time, thus reducing the accumulated system cost. We then introduced the PLS to our system and investigated the long-term secure EE performance of the MEC-enabled IoT network with NOMA assistance. It has shown that NOMA can improve both EE and PLS for the network. Finally, we switch from the single antenna scenario to a multiple-input single-output (MISO) system to exploit space diversity and beam forming techniques in mmWave communication. IRS can be used simultaneously to help relieve the pathloss and reconfigure multi-path links. In the final part, we first investigated the secure EE performance of IRS-assisted MISO networks and introduced a friendly jammer to block the eavesdroppers and improve the PLS rate. We then combined the IRS with the NOMA in the MEC network and showed that the IRS can further enhance the system EE

    Securing internet of medical things with friendly-jamming schemes

    Get PDF
    The Internet of Medical Things (IoMT)-enabled e-healthcare can complement traditional medical treatments in a flexible and convenient manner. However, security and privacy become the main concerns of IoMT due to the limited computational capability, memory space and energy constraint of medical sensors, leading to the in-feasibility for conventional cryptographic approaches, which are often computationally-complicated. In contrast to cryptographic approaches, friendly jamming (Fri-jam) schemes will not cause extra computing cost to medical sensors, thereby becoming potential countermeasures to ensure security of IoMT. In this paper, we present a study on using Fri-jam schemes in IoMT. We first analyze the data security in IoMT and discuss the challenges. We then propose using Fri-jam schemes to protect the confidential medical data of patients collected by medical sensors from being eavesdropped. We also discuss the integration of Fri-jam schemes with various communication technologies, including beamforming, Simultaneous Wireless Information and Power Transfer (SWIPT) and full duplexity. Moreover, we present two case studies of Fri-jam schemes in IoMT. The results of these two case studies indicate that the Fri-jam method will significantly decrease the eavesdropping risk while leading to no significant influence on legitimate transmission
    • …
    corecore