104 research outputs found
On the Performance and Optimization for MEC Networks Using Uplink NOMA
In this paper, we investigate a non-orthogonal multiple access (NOMA) based
mobile edge computing (MEC) network, in which two users may partially offload
their respective tasks to a single MEC server through uplink NOMA. We propose a
new offloading scheme that can operate in three different modes, namely the
partial computation offloading, the complete local computation, and the
complete offloading. We further derive a closed-form expression of the
successful computation probability for the proposed scheme. As part of the
proposed offloading scheme, we formulate a problem to maximize the successful
computation probability by jointly optimizing the time for offloading, the
power allocation of the two users and the offloading ratios which decide how
many tasks should be offloaded to the MEC server. We obtain the optimal
solutions in the closed forms. Simulation results show that our proposed scheme
can achieve the highest successful computation probability than the existing
schemes.Comment: This paper has been accepted by IEEE ICC Workshop 201
On Reliability of Smart Grid Neighborhood Area Networks
With the integration of the advanced computing and communication technologies, smart grid system is dedicated to enhance the efficiency and the reliability of future power systems greatly through renewable energy resources, as well as distributed communication intelligence and demand response. Along with advanced features of smart grid, the reliability of smart grid communication system emerges to be a critical issue, since millions of smart devices are interconnected through communication networks throughout critical power facilities, which has an immediate and direct impact on the reliability of the entire power infrastructure. In this paper, we present a comprehensive survey of reliability issues posted by the smart grid with a focus on communications in support of neighborhood area networks (NAN). Specifically, we focus on network architecture, reliability requirements and challenges of both communication networks and systems, secure countermeasures, and case studies in smart grid NAN. We aim to provide a deep understanding of reliability challenges and effective solutions toward reliability issues in smart grid NAN
Identity‐based Schemes for a Secured Big Data and Cloud ICT Framework in Smart Grid System
Smart grid is an intelligent cyber physical system (CPS). The CPS generates a massive amount of data for efficient grid operation. In this paper, a big data‐driven, cloud‐based information and communication technology (ICT) framework for smart grid CPS is proposed. The proposed ICT framework deploys hybrid cloud servers to enhance scalability and reliability of smart grid communication infrastructure. Because the data in the ICT framework contains much privacy of customers and important data for automated controlling, the security of data transmission must be ensured. In order to secure the communications over the Internet in the system, identity‐based schemes are proposed especially because of their advantage in key management. Specifically, an identity‐based signcryption (IBSC) scheme is proposed to provide confidentiality, non‐repudiation, and data integrity. For practical purposes, an identity‐based signature scheme is relaxed from the proposed IBSC to provide non‐repudiation only. Moreover, identity‐based schemes are also proposed to achieve signature delegation within the ICT framework. Security of the proposed IBSC scheme is rigorously analyzed in this work. Efficiency of the proposed IBSC scheme is demonstrated with an implementation using modified Weil pairing over an elliptic curve
A Security Protocol for Advanced Metering Infrastructure in Smart Grid
In this paper, we propose a security protocol for advanced metering infrastructure (AMI) in smart grid. AMI is one of the important components in smart grid and it suffers from various vulnerabilities due to its uniqueness compared with wired networks and traditional wireless mesh networks. Our proposed security protocol for AMI includes initial authentication, secure uplink data aggregation/recovery, and secure downlink data transmission. Compared with existing researches in such area, our proposed security protocol let the customers be treated fairly, the privacy of customers be protected, and the control messages from the service provider be delivered safely and timely
- …