104 research outputs found

    On the Performance and Optimization for MEC Networks Using Uplink NOMA

    Full text link
    In this paper, we investigate a non-orthogonal multiple access (NOMA) based mobile edge computing (MEC) network, in which two users may partially offload their respective tasks to a single MEC server through uplink NOMA. We propose a new offloading scheme that can operate in three different modes, namely the partial computation offloading, the complete local computation, and the complete offloading. We further derive a closed-form expression of the successful computation probability for the proposed scheme. As part of the proposed offloading scheme, we formulate a problem to maximize the successful computation probability by jointly optimizing the time for offloading, the power allocation of the two users and the offloading ratios which decide how many tasks should be offloaded to the MEC server. We obtain the optimal solutions in the closed forms. Simulation results show that our proposed scheme can achieve the highest successful computation probability than the existing schemes.Comment: This paper has been accepted by IEEE ICC Workshop 201

    On Reliability of Smart Grid Neighborhood Area Networks

    Get PDF
    With the integration of the advanced computing and communication technologies, smart grid system is dedicated to enhance the efficiency and the reliability of future power systems greatly through renewable energy resources, as well as distributed communication intelligence and demand response. Along with advanced features of smart grid, the reliability of smart grid communication system emerges to be a critical issue, since millions of smart devices are interconnected through communication networks throughout critical power facilities, which has an immediate and direct impact on the reliability of the entire power infrastructure. In this paper, we present a comprehensive survey of reliability issues posted by the smart grid with a focus on communications in support of neighborhood area networks (NAN). Specifically, we focus on network architecture, reliability requirements and challenges of both communication networks and systems, secure countermeasures, and case studies in smart grid NAN. We aim to provide a deep understanding of reliability challenges and effective solutions toward reliability issues in smart grid NAN

    Identity‐based Schemes for a Secured Big Data and Cloud ICT Framework in Smart Grid System

    Get PDF
    Smart grid is an intelligent cyber physical system (CPS). The CPS generates a massive amount of data for efficient grid operation. In this paper, a big data‐driven, cloud‐based information and communication technology (ICT) framework for smart grid CPS is proposed. The proposed ICT framework deploys hybrid cloud servers to enhance scalability and reliability of smart grid communication infrastructure. Because the data in the ICT framework contains much privacy of customers and important data for automated controlling, the security of data transmission must be ensured. In order to secure the communications over the Internet in the system, identity‐based schemes are proposed especially because of their advantage in key management. Specifically, an identity‐based signcryption (IBSC) scheme is proposed to provide confidentiality, non‐repudiation, and data integrity. For practical purposes, an identity‐based signature scheme is relaxed from the proposed IBSC to provide non‐repudiation only. Moreover, identity‐based schemes are also proposed to achieve signature delegation within the ICT framework. Security of the proposed IBSC scheme is rigorously analyzed in this work. Efficiency of the proposed IBSC scheme is demonstrated with an implementation using modified Weil pairing over an elliptic curve

    A Security Protocol for Advanced Metering Infrastructure in Smart Grid

    Get PDF
    In this paper, we propose a security protocol for advanced metering infrastructure (AMI) in smart grid. AMI is one of the important components in smart grid and it suffers from various vulnerabilities due to its uniqueness compared with wired networks and traditional wireless mesh networks. Our proposed security protocol for AMI includes initial authentication, secure uplink data aggregation/recovery, and secure downlink data transmission. Compared with existing researches in such area, our proposed security protocol let the customers be treated fairly, the privacy of customers be protected, and the control messages from the service provider be delivered safely and timely
    corecore