Journal on Communications ›› 2020, Vol. 41 ›› Issue (11): 52-63.doi: 10.11959/j.issn.1000-436x.2020219
Special Issue: 边缘计算
• Papers • Previous Articles Next Articles
Pinyi REN,Qian XU
Revised:
2020-09-12
Online:
2020-11-25
Published:
2020-12-19
Supported by:
CLC Number:
Pinyi REN,Qian XU. Delay and energy minimization for MEC-based secure communication[J]. Journal on Communications, 2020, 41(11): 52-63.
[1] | KUMAR K , LU Y H . Cloud computing for mobile users:can offloading computation save energy?[J]. Computer, 2010,43(4): 51-56. |
[2] | 谢人超, 廉晓飞, 贾庆民 ,等. 移动边缘计算卸载技术综述[J]. 通信学报, 2018,39(11): 138-155. |
XIE R C , LIAN X F , JIA Q M ,et al. Survey on computation offloading in mobile edge computing[J]. Journal on Communications, 2018,39(11): 138-155. | |
[3] | TRAN T X , HAJISAMI A , PANDEY P ,et al. Collaborative mobile edge computing in 5G networks:new paradigms,scenarios,and challenges[J]. IEEE Communications Magazine, 2017,55(4): 54-61. |
[4] | GUO H Z , LIU J J , ZHANG J . Computation offloading for multi-access mobile edge computing in ultra-dense networks[J]. IEEE Communications Magazine, 2018,56(8): 14-19. |
[5] | ZHANG W W , WEN Y G , GUAN K ,et al. Energy optimal mobile cloud computing under stochastic wireless channel[J]. IEEE Transactions on Wireless Communications, 2013,12(9): 4569-4581. |
[6] | BI S Z , ZHANG Y J . Computation rate maximization for wireless powered mobile-edge computing with binary computation offloading[J]. IEEE Transactions on Wireless Communications, 2018,17(6): 4177-4190. |
[7] | REN J K , RUAN Y J , YU G D . Data transmission in mobile edge networks:whether and where to compress?[J]. IEEE Communications Letters, 2019,23(3): 490-493. |
[8] | MERLUZZI M , LORENZO P D , BARBAROSSA S ,et al. Dynamic computation offloading in multi-access edge computing via ultra-reliable and low-latency communications[J]. IEEE Transactions on Signal and Information Processing over Networks, 2020,6: 342-356. |
[9] | ZHANG G L , ZHANG W Q , CAO Y ,et al. Energy-delay tradeoff for dynamic offloading in mobile-edge computing system with energy harvesting devices[J]. IEEE Transactions on Industrial Informatics, 2018,14(10): 4642-4655. |
[10] | 赵临东, 庄文芹, 陈建新 ,等. 异构蜂窝网络中分层任务卸载:建模与优化[J]. 通信学报, 2020,41(4): 34-44. |
ZHAO L D , ZHUANG W Q , CHEN J X ,et al. Hierarchical task offloading in heterogeneous cellular network:modeling and optimization[J]. Journal on Communications, 2020,41(4): 34-44. | |
[11] | GRANJAL J , MONTEIRO E , SILVA J S . Security for the Internet of things:a survey of existing protocols and open research issues[J]. IEEE Communication Surveys & Tutorials, 2015,17(3): 1294-1312. |
[12] | MUKHERJEE A , FAKOORIAN S A A , HUANG J ,et al. Principles of physical layer security in multiuser wireless networks:a survey[J]. IEEE Communication Surveys & Tutorials, 2014,16(3): 1550-1573. |
[13] | WYNER A D . The wire-tap channel[J]. Bell System Technical Journal, 1975,54(8): 1355-1387. |
[14] | HE X F , JIN R C , DAI H Y . Physical-layer assisted secure offloading in mobile-edge computing[J]. IEEE Transactions on Wireless Communications, 2020,doi:10.1109/TWC.2020.2979456. |
[15] | XU J , YAO J P . Exploiting physical-layer security for multiuser multicarrier computation offloading[J]. IEEE Wireless Communications Letters, 2019,8(1): 9-12. |
[16] | WU Y , SHI J J , NI K J ,et al. Secrecy-based delay-aware computation offloading via mobile edge computing for Internet of things[J]. IEEE Internet of Things Journal, 2019,6(3): 4201-4213. |
[17] | ZHOU Y , PAN C H , YEOH P L ,et al. Secure communications for UAV-enabled mobile edge computing systems[J]. IEEE Transactions on Communications, 2020,68(1): 376-388. |
[18] | KOYLUOGLU O.O , KOKSAL C E , GAMAL H E . On secrecy capacity scaling in wireless networks[J]. IEEE Transactions On Information Theory, 2012,58(5): 3000-3015. |
[19] | MO J H , TAO M X , LIU Y . Relay placement for physical layer security:a secure connection perspective[J]. IEEE Communications Letters, 2012,16(6): 878-881. |
[20] | 塞西亚, 陶菲克, 贝克 . LTE/LTE-advanced:UMTS长期演进理论与实践[M]. 马霓,夏斌,译.北京: 人民邮电出版社, 2012. |
SESIA S , TOUFZK I , BAKER M . LTE/LTE-advanced—The UMTS long term,evolution:from theory to practice[M]. MA N,XIA B,transl. Beijing: Posts Telecom PressPress, 2012. | |
[21] | ZHOU X Y , MCKAY M R , MAHAM B ,et al. Rethinking the secrecy outage formulation:a secure transmission design perspective[J]. IEEE Communications Letters, 2011,15(3): 302-304. |
[22] | CHIU S N , STOYAN D , KENDALL W S ,et al. Stochastic geometry and its applications[M]. 3rd edition United Kingdom: John Wiley &Sons Ltd., 2013. |
[23] | XU Q , REN P Y , SONG H B ,et al. Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations[J]. IEEE Access, 2016,4: 2840-2853. |
[24] | CAI C X , CAI Y M , ZHOU X Y ,et al. When does relay transmission give a more secure connection in wireless Ad Hoc networks?[J]. IEEE Transactions on Information Forensics and Security, 2014,9(4): 624-632. |
[25] | LIU L , ZHOU Y Q , YUAN J H ,et al. Economically optimal MS association for multimedia content delivery in cache-enabled heterogeneous cloud radio access networks[J]. IEEE Journal on Selected Areas in Communications, 2019,37(7): 1584-1593. |
[26] | LIU L , ZHOU Y Q , Garcia V ,et al. Load aware joint CoMP clustering and inter-cell resource scheduling in heterogeneous ultra dense cellular networks[J]. IEEE Transactions on Vehicular Technology, 2018,67(3): 2741-2755. |
[27] | GARCIA V , ZHOU Y Q , SHI J L . Coordinated multipoint transmission in dense cellular networks with user-centric adaptive clustering[J]. IEEE Transactions on Wireless Communications, 2014,13(8): 4297-4308. |
[28] | GRADSHTEYN I S , RYZHIK I M , JEFFREY A ,et al. Table of integrals series,and poducts[M]. 7th ed. New York: AcademicPress, 2007. |
[29] | GRANT M , BOYD S . CVX:MATLAB software for disciplined convex programming[J]. 2011. |
[1] | Long YANG, Li ZHAO, Yuchen ZHOU, Bingtao HE, Jian CHEN. Buffer-aided cooperative NOMA with power transfer [J]. Journal on Communications, 2023, 44(6): 77-89. |
[2] | Weifeng LU, Ning LI, Jia XU, Lijie XU, Jian XU. Joint scheduling algorithm for correlative tasks in multi-access edge computing [J]. Journal on Communications, 2023, 44(4): 87-98. |
[3] | Xin SUN, Guifu ZHANG, Hongyan XING, Wang Zenghui. Research on intrusion detection for maritime meteorological sensor network based on balancing generative adversarial network [J]. Journal on Communications, 2023, 44(4): 124-136. |
[4] | Xiaobei ZHANG, Quan ZHANG, Ming FANG, Kun QIN, Qi ZHANG. Research on channel-fixed delay error estimation of wideband digital array radar [J]. Journal on Communications, 2023, 44(3): 24-32. |
[5] | Xueyong YU, Lixiang QIU, Jianing SONG, Hongbo ZHU. Security communication and energy efficiency optimization strategy in UAV-aided edge computing [J]. Journal on Communications, 2023, 44(3): 45-54. |
[6] | Wei FAN, Cheng PENG, Dali ZHU, Yuqing WANG. Research on intrusion response strategy based on static Bayesian game in mobile edge computing network [J]. Journal on Communications, 2023, 44(2): 70-81. |
[7] | Shuxu ZHAO, Ping WEI, Xiaolong WANG. Optimal coalition structure generation strategy in multi-task concurrent edge computing environment [J]. Journal on Communications, 2023, 44(2): 172-184. |
[8] | Long LONG, Zichen LIU, Zaiwang LU, Yucheng ZHANG, Lei LI. Joint optimization strategy of service cache and resource allocation in mobile edge network [J]. Journal on Communications, 2023, 44(1): 64-74. |
[9] | Zhen YANG, Xuan FENG, Bin LYU. Research on throughput maximization for intelligent reflecting surface assisted dual-hop relay wireless powered communication network [J]. Journal on Communications, 2022, 43(9): 90-99. |
[10] | Haijun LIAO, Zehan JIA, Zhenyu ZHOU, Nian LIU, Fei WANG, Zhong GAN, Xianjiong YAO. Dispatching and control information freshness guaranteed resource optimization in simplified power Internet of things [J]. Journal on Communications, 2022, 43(7): 203-214. |
[11] | Cuiran LI, Xuejie WANG, Jianli XIE, Anqi LYU. Routing algorithm for railway monitoring linear WSN based on improved PSO [J]. Journal on Communications, 2022, 43(5): 155-165. |
[12] | Yu ZHANG, Xiongwen ZHAO, Xiaoqing WANG, Suiyan GENG, Peng QIN, Zhenyu ZHOU. Robust resource allocation algorithm for multicarrier NOMA security communication system [J]. Journal on Communications, 2022, 43(3): 42-52. |
[13] | Yang CAO, Ye ZHONG, Chunling PENG, Xiaofeng PENG. Energy efficiency optimization algorithm of heterogeneous networks based on hybrid energy supply and energy cooperation [J]. Journal on Communications, 2022, 43(3): 135-147. |
[14] | Zhisheng NIU, Sheng ZHOU, Yuxuan SUN. Green communication and networking for Carbon-peaking and Carbon-neutrality: challenges and solutions [J]. Journal on Communications, 2022, 43(2): 1-14. |
[15] | Hancheng LU, Yazheng WANG, Dan ZHAO, Tao LUO, Jun WU. Survey of physical layer security of intelligent reflecting surface-assisted wireless communication systems [J]. Journal on Communications, 2022, 43(2): 171-184. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|