[1] |
KUMAR K , LU Y H . Cloud computing for mobile users:can offloading computation save energy?[J]. Computer, 2010,43(4): 51-56.
|
[2] |
谢人超, 廉晓飞, 贾庆民 ,等. 移动边缘计算卸载技术综述[J]. 通信学报, 2018,39(11): 138-155.
|
|
XIE R C , LIAN X F , JIA Q M ,et al. Survey on computation offloading in mobile edge computing[J]. Journal on Communications, 2018,39(11): 138-155.
|
[3] |
TRAN T X , HAJISAMI A , PANDEY P ,et al. Collaborative mobile edge computing in 5G networks:new paradigms,scenarios,and challenges[J]. IEEE Communications Magazine, 2017,55(4): 54-61.
|
[4] |
GUO H Z , LIU J J , ZHANG J . Computation offloading for multi-access mobile edge computing in ultra-dense networks[J]. IEEE Communications Magazine, 2018,56(8): 14-19.
|
[5] |
ZHANG W W , WEN Y G , GUAN K ,et al. Energy optimal mobile cloud computing under stochastic wireless channel[J]. IEEE Transactions on Wireless Communications, 2013,12(9): 4569-4581.
|
[6] |
BI S Z , ZHANG Y J . Computation rate maximization for wireless powered mobile-edge computing with binary computation offloading[J]. IEEE Transactions on Wireless Communications, 2018,17(6): 4177-4190.
|
[7] |
REN J K , RUAN Y J , YU G D . Data transmission in mobile edge networks:whether and where to compress?[J]. IEEE Communications Letters, 2019,23(3): 490-493.
|
[8] |
MERLUZZI M , LORENZO P D , BARBAROSSA S ,et al. Dynamic computation offloading in multi-access edge computing via ultra-reliable and low-latency communications[J]. IEEE Transactions on Signal and Information Processing over Networks, 2020,6: 342-356.
|
[9] |
ZHANG G L , ZHANG W Q , CAO Y ,et al. Energy-delay tradeoff for dynamic offloading in mobile-edge computing system with energy harvesting devices[J]. IEEE Transactions on Industrial Informatics, 2018,14(10): 4642-4655.
|
[10] |
赵临东, 庄文芹, 陈建新 ,等. 异构蜂窝网络中分层任务卸载:建模与优化[J]. 通信学报, 2020,41(4): 34-44.
|
|
ZHAO L D , ZHUANG W Q , CHEN J X ,et al. Hierarchical task offloading in heterogeneous cellular network:modeling and optimization[J]. Journal on Communications, 2020,41(4): 34-44.
|
[11] |
GRANJAL J , MONTEIRO E , SILVA J S . Security for the Internet of things:a survey of existing protocols and open research issues[J]. IEEE Communication Surveys & Tutorials, 2015,17(3): 1294-1312.
|
[12] |
MUKHERJEE A , FAKOORIAN S A A , HUANG J ,et al. Principles of physical layer security in multiuser wireless networks:a survey[J]. IEEE Communication Surveys & Tutorials, 2014,16(3): 1550-1573.
|
[13] |
WYNER A D . The wire-tap channel[J]. Bell System Technical Journal, 1975,54(8): 1355-1387.
|
[14] |
HE X F , JIN R C , DAI H Y . Physical-layer assisted secure offloading in mobile-edge computing[J]. IEEE Transactions on Wireless Communications, 2020,doi:10.1109/TWC.2020.2979456.
|
[15] |
XU J , YAO J P . Exploiting physical-layer security for multiuser multicarrier computation offloading[J]. IEEE Wireless Communications Letters, 2019,8(1): 9-12.
|
[16] |
WU Y , SHI J J , NI K J ,et al. Secrecy-based delay-aware computation offloading via mobile edge computing for Internet of things[J]. IEEE Internet of Things Journal, 2019,6(3): 4201-4213.
|
[17] |
ZHOU Y , PAN C H , YEOH P L ,et al. Secure communications for UAV-enabled mobile edge computing systems[J]. IEEE Transactions on Communications, 2020,68(1): 376-388.
|
[18] |
KOYLUOGLU O.O , KOKSAL C E , GAMAL H E . On secrecy capacity scaling in wireless networks[J]. IEEE Transactions On Information Theory, 2012,58(5): 3000-3015.
|
[19] |
MO J H , TAO M X , LIU Y . Relay placement for physical layer security:a secure connection perspective[J]. IEEE Communications Letters, 2012,16(6): 878-881.
|
[20] |
塞西亚, 陶菲克, 贝克 . LTE/LTE-advanced:UMTS长期演进理论与实践[M]. 马霓,夏斌,译.北京: 人民邮电出版社, 2012.
|
|
SESIA S , TOUFZK I , BAKER M . LTE/LTE-advanced—The UMTS long term,evolution:from theory to practice[M]. MA N,XIA B,transl. Beijing: Posts Telecom PressPress, 2012.
|
[21] |
ZHOU X Y , MCKAY M R , MAHAM B ,et al. Rethinking the secrecy outage formulation:a secure transmission design perspective[J]. IEEE Communications Letters, 2011,15(3): 302-304.
|
[22] |
CHIU S N , STOYAN D , KENDALL W S ,et al. Stochastic geometry and its applications[M]. 3rd edition United Kingdom: John Wiley &Sons Ltd., 2013.
|
[23] |
XU Q , REN P Y , SONG H B ,et al. Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations[J]. IEEE Access, 2016,4: 2840-2853.
|
[24] |
CAI C X , CAI Y M , ZHOU X Y ,et al. When does relay transmission give a more secure connection in wireless Ad Hoc networks?[J]. IEEE Transactions on Information Forensics and Security, 2014,9(4): 624-632.
|
[25] |
LIU L , ZHOU Y Q , YUAN J H ,et al. Economically optimal MS association for multimedia content delivery in cache-enabled heterogeneous cloud radio access networks[J]. IEEE Journal on Selected Areas in Communications, 2019,37(7): 1584-1593.
|
[26] |
LIU L , ZHOU Y Q , Garcia V ,et al. Load aware joint CoMP clustering and inter-cell resource scheduling in heterogeneous ultra dense cellular networks[J]. IEEE Transactions on Vehicular Technology, 2018,67(3): 2741-2755.
|
[27] |
GARCIA V , ZHOU Y Q , SHI J L . Coordinated multipoint transmission in dense cellular networks with user-centric adaptive clustering[J]. IEEE Transactions on Wireless Communications, 2014,13(8): 4297-4308.
|
[28] |
GRADSHTEYN I S , RYZHIK I M , JEFFREY A ,et al. Table of integrals series,and poducts[M]. 7th ed. New York: AcademicPress, 2007.
|
[29] |
GRANT M , BOYD S . CVX:MATLAB software for disciplined convex programming[J]. 2011.
|