Physical Layer Security Assisted Computation Offloading in Intelligently Connected Vehicle Networks
نویسندگان
چکیده
In this paper, we propose a secure computationoffloading scheme (SCOS) in intelligently connected vehicle (ICV) networks, aiming to minimize overall latency of computing via offloading part computational tasks nearby servers small cell base stations (SBSs), while securing the information delivered during and feedback phases physical layer security. Existing computation schemes usually neglected time-varying characteristics channels their corresponding secrecy rates, resulting an inappropriate task partition ratio large outage probability. To address these issues, utilize ergodic rate determine how many are offloaded edge, where represents average over all realizations wireless channel. Adaptive wiretap code rates proposed with constraint match channels. addition, beamforming artificial noise (AN) can improve uplink downlink even without eavesdropper channel state (CSI). Numerical results demonstrate that have shorter system delay than strategies neglecting characteristics.
منابع مشابه
Physical Layer Security in Wireless Communication Networks
Physical layer (PHY) security has become an emerging area of research recently. Wireless networks use unguided medium as communication channels, so gathering wireless data transmission is easier when compared to traditional cable systems. With the rise of new security challenges, many different solutions have been offered and are being developed. However, maintaining security in wireless networ...
متن کاملPhysical layer security in broadcast networks
This paper reviews the information theoretic characterization of security in broadcast channels, in which a transmitter has both public and confidential messages intended for multiple receivers. All messages must be successfully received by their intended receivers, and the confidential messages must be kept as secret as possible from non-intended recipients. Various scenarios are considered in...
متن کاملIC-Cloud: Computation Offloading to an Intermittently-Connected Cloud
Offloading computation-intensive components of mobile applications to the cloud is of great potential to speedup the execution and reduce the energy consumption for mobile devices. The gain from computation offloading is typically counterbalanced by communication costs and delays. It is, therefore, important to undertake offloading decisions based on future prediction of Internet access timelin...
متن کاملCorrection to: Artificial noise-assisted physical layer security in D2D-enabled cellular networks
متن کامل
Artificial noise-assisted physical layer security in D2D-enabled cellular networks
Device-to-device (D2D) communication has been deemed as a promising technology in the next generation 5G wireless communication. Due to the openness nature of the transmission medium, secure transmission is also a critical issue in the D2D-enabled cellular network as well as other wireless systems. In this paper, we investigate secure communication for the cellular downlink in this hybrid netwo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Wireless Communications
سال: 2021
ISSN: ['1536-1276', '1558-2248']
DOI: https://doi.org/10.1109/twc.2021.3051772