A Power Allocation Strategy in Mobile Edge Computing for Maximizing Sum Secrecy Rate
This paper investigates the secure communication problem in the downlink of mobile edge computing (MEC) systems. A sum secrecy rate (SSR) maximization problem is formulated under transmission power and time constraints. To enhance the secrecy of the downlink transmission, we design the Geometric Wat...
Saved in:
| Published in | IEEE Vehicular Technology Conference pp. 1 - 5 |
|---|---|
| Main Authors | , , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
07.10.2024
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2577-2465 |
| DOI | 10.1109/VTC2024-Fall63153.2024.10757992 |
Cover
| Abstract | This paper investigates the secure communication problem in the downlink of mobile edge computing (MEC) systems. A sum secrecy rate (SSR) maximization problem is formulated under transmission power and time constraints. To enhance the secrecy of the downlink transmission, we design the Geometric Water-Filling for SSR (GWF-SSR) algorithm for power allocation. Initially, we determine the minimum power allocation for each node to satisfy the transmission time constraint. Subsequently, the GWF-SSR algorithm is employed to allocate the remaining power. Numerical results demonstrate that the proposed algorithm outperforms existing benchmark algorithms. Besides, the GWF-SSR algorithm is superior to the Geometric Water-Filling (GWF) algorithm in terms of the SSR. |
|---|---|
| AbstractList | This paper investigates the secure communication problem in the downlink of mobile edge computing (MEC) systems. A sum secrecy rate (SSR) maximization problem is formulated under transmission power and time constraints. To enhance the secrecy of the downlink transmission, we design the Geometric Water-Filling for SSR (GWF-SSR) algorithm for power allocation. Initially, we determine the minimum power allocation for each node to satisfy the transmission time constraint. Subsequently, the GWF-SSR algorithm is employed to allocate the remaining power. Numerical results demonstrate that the proposed algorithm outperforms existing benchmark algorithms. Besides, the GWF-SSR algorithm is superior to the Geometric Water-Filling (GWF) algorithm in terms of the SSR. |
| Author | Liao, Wensong Tan, Chong Mao, Jiahui Liu, Hong Zheng, Min |
| Author_xml | – sequence: 1 givenname: Jiahui surname: Mao fullname: Mao, Jiahui email: jiahui.mao@mail.sim.ac.cn organization: Chinese Academy of Sciences,Shanghai Institute of Microsystem and Information Technology,Shanghai,China,200050 – sequence: 2 givenname: Wensong surname: Liao fullname: Liao, Wensong email: wensong.liao@mail.sim.ac.cn organization: Chinese Academy of Sciences,Shanghai Institute of Microsystem and Information Technology,Shanghai,China,200050 – sequence: 3 givenname: Chong surname: Tan fullname: Tan, Chong email: chong.tan@mail.sim.ac.cn organization: Chinese Academy of Sciences,Shanghai Institute of Microsystem and Information Technology,Shanghai,China,200050 – sequence: 4 givenname: Hong surname: Liu fullname: Liu, Hong email: hong.liu@mail.sim.ac.cn organization: Chinese Academy of Sciences,Shanghai Institute of Microsystem and Information Technology,Shanghai,China,200050 – sequence: 5 givenname: Min surname: Zheng fullname: Zheng, Min email: min.zheng@mail.sim.ac.cn organization: Chinese Academy of Sciences,Shanghai Institute of Microsystem and Information Technology,Shanghai,China,200050 |
| BookMark | eNo1kE1Lw0AURUdRsK39By5m5yp1PvJmOssSWhVaFBvclsnMSxhJMiVN0fjrbVFXl8Pl3MUdk6s2tkjIPWczzpl5eM8zwUSarGxdK8lBzs4440yDNkZckKnRZi5PDdd6ri7JSIDWiUgV3JDx4fDBGONciRHJF_Q1fmJHF3Udne1DbOm272yP1UBDSzexCDXSpa-QZrHZH_vQVrSMHd3Yr9CE7zNujw3douvQDfTtpN6S69LWB5z-5YTkq2WePSXrl8fnbLFOguF9YqRDLlnqvSkUFE5zxz1aZyQDKEGpuUcEKBTzFjwyLAWikLoErzTIQk7I3e9sQMTdvguN7Ybd_wnyB6RAVgs |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/VTC2024-Fall63153.2024.10757992 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore Digital Library (LUT) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore Digital Library (LUT) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9798331517786 |
| EISSN | 2577-2465 |
| EndPage | 5 |
| ExternalDocumentID | 10757992 |
| Genre | orig-research |
| GroupedDBID | -~X 6IE 6IH ALMA_UNASSIGNED_HOLDINGS CBEJK RIE RIO |
| ID | FETCH-LOGICAL-i91t-93ce1304dd9b65bc71c1deac93055f5668dee55b60da5de0ef2ee237f5d6753b3 |
| IEDL.DBID | RIE |
| IngestDate | Wed Jan 15 06:20:47 EST 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i91t-93ce1304dd9b65bc71c1deac93055f5668dee55b60da5de0ef2ee237f5d6753b3 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_10757992 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-Oct.-7 |
| PublicationDateYYYYMMDD | 2024-10-07 |
| PublicationDate_xml | – month: 10 year: 2024 text: 2024-Oct.-7 day: 07 |
| PublicationDecade | 2020 |
| PublicationTitle | IEEE Vehicular Technology Conference |
| PublicationTitleAbbrev | VTC |
| PublicationYear | 2024 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0001162 |
| Score | 2.2729678 |
| Snippet | This paper investigates the secure communication problem in the downlink of mobile edge computing (MEC) systems. A sum secrecy rate (SSR) maximization problem... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Benchmark testing Downlink Multi-access edge computing Physical layer security power allocation Resource management secrecy rate Time factors Transforms Vehicular and wireless technologies Water-Filling |
| Title | A Power Allocation Strategy in Mobile Edge Computing for Maximizing Sum Secrecy Rate |
| URI | https://ieeexplore.ieee.org/document/10757992 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA66B9EXbxPv5EHwqXW9JG0ex9gQYWO4KnsbTXIiw60TacHt13vSdvMCgvSlCaSEHHK-c5p83yHkJsV0y7DAOMaPwQk9Ezkp4q4jlJRxVanGkpP7A37_FD6M2bgmq5dcGAAoL5-Ba1_Ls3y9UIX9VYY7PGKREOhxt6OYV2Stjdv1PO7vkNtaRPPuOelgXh86vXQ24wHua9c23fUnfhRTKbGkt08G61lUV0he3SKXrlr9Emj89zQPSPOLtkeHG0A6JFuQHZG9b4qDxyRp06Gti0bbM4ti1iq0Fqhd0mlG-wuJboJ29QvQquADDqMY2NJ--jGdT1e2OSrmdGTDTbWkjzi0SZJeN-ncO3VhBWcqvNwRgQKErlBrITmTKvKUp9EBC6v-ZTC-izUAY5K3dMo0tMD4AH4QGaYxvQhkcEIa2SKDU0K5ADBGMRVJEzJthC9Djo_CMILrUJyRpl2fyVslnTFZL835H_0XZLe0mj2hjy5JI38v4ApRP5fXpbU_Abn3rGc |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA6i4OXF28S7eRB8al3bpF0ex9iYuo7hquxtNMmJDLdOZAO3X-9Ju80LCNKXJpAScsg532nyfYeQ6xTTLcMD4xi_Ag7zTOSkGHcdoaSsFJVqLDk5bofNJ3bf470FWT3nwgBAfvkMXPuan-XrsZraX2W4wyMeCYEed4MzxnhB11o5Xs8L_U1ys5DRvH1OapjZM6eRDodhgDvbtU13-ZEf5VTyaNLYJe3lPIpLJK_udCJdNf8l0fjvie6R0hdxj3ZWIWmfrEF2QHa-aQ4ekqRKO7YyGq0ObRyzdqELidoZHWQ0Hkt0FLSuX4AWJR9wGEVoS-P0YzAazG2zOx3RrgWcakYfcWiJJI16Ums6i9IKzkB4E0cECjB4Ma2FDLlUkac8jS5YWP0vgwivogE4l2FZp1xDGYwP4AeR4RoTjEAGR2Q9G2dwTGgoAIxRXEXSMK6N8CUL8VEIJELNxAkp2fXpvxXiGf3l0pz-0X9FtppJ3Oq37toPZ2Q7t6A9r4_OyfrkfQoXiAEm8jK3_Cfv9a-0 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IEEE+Vehicular+Technology+Conference&rft.atitle=A+Power+Allocation+Strategy+in+Mobile+Edge+Computing+for+Maximizing+Sum+Secrecy+Rate&rft.au=Mao%2C+Jiahui&rft.au=Liao%2C+Wensong&rft.au=Tan%2C+Chong&rft.au=Liu%2C+Hong&rft.date=2024-10-07&rft.pub=IEEE&rft.eissn=2577-2465&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FVTC2024-Fall63153.2024.10757992&rft.externalDocID=10757992 |