2020 IEEE International Conference on Smart Internet of Things (SmartIoT) 2020
DOI: 10.1109/smartiot49966.2020.00018
|View full text |Cite
|
Sign up to set email alerts
|

Energy Efficient Resource Allocation and Computation Offloading Strategy in a UAV-enabled Secure Edge-Cloud Computing System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…U. A. Khan et al [18] exploited chaotic cryptography to encrypt offloading tasks for security. Further, the study formulated an energy consumption minimization problem and solved it with heuristic algorithms.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…U. A. Khan et al [18] exploited chaotic cryptography to encrypt offloading tasks for security. Further, the study formulated an energy consumption minimization problem and solved it with heuristic algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…By deploying a UAV-assisted MEC system, end devices can efficiently complete delay-sensitive applications. In [14][15][16][17][18][19][20], the secure data offloading mechanisms were investigated along with the research on UAV-assisted MEC systems [21][22][23][24]. Physical layer security has become one of the constraints when data offloading occurs in the MEC system.…”
Section: Researchmentioning
confidence: 99%
“…The research on the security of the computational offloading process can mainly be divided into two categories: one is based on the traditional cryptography; the other is based on the physical layer security. [17,18] studied the energy efficiency of computational offloading based on cryptographic encryption, taking into account the delay and energy consumption caused by encryption, making energy efficiency evaluation closer to practical applications. [17] compared the energy consumption results of computational offloading with encryption and without encryption.…”
Section: Introductionmentioning
confidence: 99%