A Power Allocation Strategy in Mobile Edge Computing for Maximizing Sum Secrecy Rate

This paper investigates the secure communication problem in the downlink of mobile edge computing (MEC) systems. A sum secrecy rate (SSR) maximization problem is formulated under transmission power and time constraints. To enhance the secrecy of the downlink transmission, we design the Geometric Wat...

Full description

Saved in:
Bibliographic Details
Published inIEEE Vehicular Technology Conference pp. 1 - 5
Main Authors Mao, Jiahui, Liao, Wensong, Tan, Chong, Liu, Hong, Zheng, Min
Format Conference Proceeding
LanguageEnglish
Published IEEE 07.10.2024
Subjects
Online AccessGet full text
ISSN2577-2465
DOI10.1109/VTC2024-Fall63153.2024.10757992

Cover

Abstract This paper investigates the secure communication problem in the downlink of mobile edge computing (MEC) systems. A sum secrecy rate (SSR) maximization problem is formulated under transmission power and time constraints. To enhance the secrecy of the downlink transmission, we design the Geometric Water-Filling for SSR (GWF-SSR) algorithm for power allocation. Initially, we determine the minimum power allocation for each node to satisfy the transmission time constraint. Subsequently, the GWF-SSR algorithm is employed to allocate the remaining power. Numerical results demonstrate that the proposed algorithm outperforms existing benchmark algorithms. Besides, the GWF-SSR algorithm is superior to the Geometric Water-Filling (GWF) algorithm in terms of the SSR.
AbstractList This paper investigates the secure communication problem in the downlink of mobile edge computing (MEC) systems. A sum secrecy rate (SSR) maximization problem is formulated under transmission power and time constraints. To enhance the secrecy of the downlink transmission, we design the Geometric Water-Filling for SSR (GWF-SSR) algorithm for power allocation. Initially, we determine the minimum power allocation for each node to satisfy the transmission time constraint. Subsequently, the GWF-SSR algorithm is employed to allocate the remaining power. Numerical results demonstrate that the proposed algorithm outperforms existing benchmark algorithms. Besides, the GWF-SSR algorithm is superior to the Geometric Water-Filling (GWF) algorithm in terms of the SSR.
Author Liao, Wensong
Tan, Chong
Mao, Jiahui
Liu, Hong
Zheng, Min
Author_xml – sequence: 1
  givenname: Jiahui
  surname: Mao
  fullname: Mao, Jiahui
  email: jiahui.mao@mail.sim.ac.cn
  organization: Chinese Academy of Sciences,Shanghai Institute of Microsystem and Information Technology,Shanghai,China,200050
– sequence: 2
  givenname: Wensong
  surname: Liao
  fullname: Liao, Wensong
  email: wensong.liao@mail.sim.ac.cn
  organization: Chinese Academy of Sciences,Shanghai Institute of Microsystem and Information Technology,Shanghai,China,200050
– sequence: 3
  givenname: Chong
  surname: Tan
  fullname: Tan, Chong
  email: chong.tan@mail.sim.ac.cn
  organization: Chinese Academy of Sciences,Shanghai Institute of Microsystem and Information Technology,Shanghai,China,200050
– sequence: 4
  givenname: Hong
  surname: Liu
  fullname: Liu, Hong
  email: hong.liu@mail.sim.ac.cn
  organization: Chinese Academy of Sciences,Shanghai Institute of Microsystem and Information Technology,Shanghai,China,200050
– sequence: 5
  givenname: Min
  surname: Zheng
  fullname: Zheng, Min
  email: min.zheng@mail.sim.ac.cn
  organization: Chinese Academy of Sciences,Shanghai Institute of Microsystem and Information Technology,Shanghai,China,200050
BookMark eNo1kE1Lw0AURUdRsK39By5m5yp1PvJmOssSWhVaFBvclsnMSxhJMiVN0fjrbVFXl8Pl3MUdk6s2tkjIPWczzpl5eM8zwUSarGxdK8lBzs4440yDNkZckKnRZi5PDdd6ri7JSIDWiUgV3JDx4fDBGONciRHJF_Q1fmJHF3Udne1DbOm272yP1UBDSzexCDXSpa-QZrHZH_vQVrSMHd3Yr9CE7zNujw3douvQDfTtpN6S69LWB5z-5YTkq2WePSXrl8fnbLFOguF9YqRDLlnqvSkUFE5zxz1aZyQDKEGpuUcEKBTzFjwyLAWikLoErzTIQk7I3e9sQMTdvguN7Ybd_wnyB6RAVgs
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/VTC2024-Fall63153.2024.10757992
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore Digital Library (LUT)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore Digital Library (LUT)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9798331517786
EISSN 2577-2465
EndPage 5
ExternalDocumentID 10757992
Genre orig-research
GroupedDBID -~X
6IE
6IH
ALMA_UNASSIGNED_HOLDINGS
CBEJK
RIE
RIO
ID FETCH-LOGICAL-i91t-93ce1304dd9b65bc71c1deac93055f5668dee55b60da5de0ef2ee237f5d6753b3
IEDL.DBID RIE
IngestDate Wed Jan 15 06:20:47 EST 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i91t-93ce1304dd9b65bc71c1deac93055f5668dee55b60da5de0ef2ee237f5d6753b3
PageCount 5
ParticipantIDs ieee_primary_10757992
PublicationCentury 2000
PublicationDate 2024-Oct.-7
PublicationDateYYYYMMDD 2024-10-07
PublicationDate_xml – month: 10
  year: 2024
  text: 2024-Oct.-7
  day: 07
PublicationDecade 2020
PublicationTitle IEEE Vehicular Technology Conference
PublicationTitleAbbrev VTC
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001162
Score 2.2729678
Snippet This paper investigates the secure communication problem in the downlink of mobile edge computing (MEC) systems. A sum secrecy rate (SSR) maximization problem...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Benchmark testing
Downlink
Multi-access edge computing
Physical layer security
power allocation
Resource management
secrecy rate
Time factors
Transforms
Vehicular and wireless technologies
Water-Filling
Title A Power Allocation Strategy in Mobile Edge Computing for Maximizing Sum Secrecy Rate
URI https://ieeexplore.ieee.org/document/10757992
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA66B9EXbxPv5EHwqXW9JG0ex9gQYWO4KnsbTXIiw60TacHt13vSdvMCgvSlCaSEHHK-c5p83yHkJsV0y7DAOMaPwQk9Ezkp4q4jlJRxVanGkpP7A37_FD6M2bgmq5dcGAAoL5-Ba1_Ls3y9UIX9VYY7PGKREOhxt6OYV2Stjdv1PO7vkNtaRPPuOelgXh86vXQ24wHua9c23fUnfhRTKbGkt08G61lUV0he3SKXrlr9Emj89zQPSPOLtkeHG0A6JFuQHZG9b4qDxyRp06Gti0bbM4ti1iq0Fqhd0mlG-wuJboJ29QvQquADDqMY2NJ--jGdT1e2OSrmdGTDTbWkjzi0SZJeN-ncO3VhBWcqvNwRgQKErlBrITmTKvKUp9EBC6v-ZTC-izUAY5K3dMo0tMD4AH4QGaYxvQhkcEIa2SKDU0K5ADBGMRVJEzJthC9Djo_CMILrUJyRpl2fyVslnTFZL835H_0XZLe0mj2hjy5JI38v4ApRP5fXpbU_Abn3rGc
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA6i4OXF28S7eRB8al3bpF0ex9iYuo7hquxtNMmJDLdOZAO3X-9Ju80LCNKXJpAScsg532nyfYeQ6xTTLcMD4xi_Ag7zTOSkGHcdoaSsFJVqLDk5bofNJ3bf470FWT3nwgBAfvkMXPuan-XrsZraX2W4wyMeCYEed4MzxnhB11o5Xs8L_U1ys5DRvH1OapjZM6eRDodhgDvbtU13-ZEf5VTyaNLYJe3lPIpLJK_udCJdNf8l0fjvie6R0hdxj3ZWIWmfrEF2QHa-aQ4ekqRKO7YyGq0ObRyzdqELidoZHWQ0Hkt0FLSuX4AWJR9wGEVoS-P0YzAazG2zOx3RrgWcakYfcWiJJI16Ums6i9IKzkB4E0cECjB4Ma2FDLlUkac8jS5YWP0vgwivogE4l2FZp1xDGYwP4AeR4RoTjEAGR2Q9G2dwTGgoAIxRXEXSMK6N8CUL8VEIJELNxAkp2fXpvxXiGf3l0pz-0X9FtppJ3Oq37toPZ2Q7t6A9r4_OyfrkfQoXiAEm8jK3_Cfv9a-0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IEEE+Vehicular+Technology+Conference&rft.atitle=A+Power+Allocation+Strategy+in+Mobile+Edge+Computing+for+Maximizing+Sum+Secrecy+Rate&rft.au=Mao%2C+Jiahui&rft.au=Liao%2C+Wensong&rft.au=Tan%2C+Chong&rft.au=Liu%2C+Hong&rft.date=2024-10-07&rft.pub=IEEE&rft.eissn=2577-2465&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FVTC2024-Fall63153.2024.10757992&rft.externalDocID=10757992