2020
DOI: 10.1109/access.2020.3016764
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Cooperative Sensing Based Secure Communication Strategy of Edge Computational Networks for Smart Cities

Abstract: With the development of smart cities, lots of mobile cooperative sensing based nodes have emerged. However, due to the open nature of wireless transmission, attackers in the networks can use some intelligent radio devices to deteriorate the secure transmission, which imposes a severe issue of information leakage. In this paper, we consider the transmitter has some computational tasks to be computed, under the environments of intelligent attacker. Due to the limited computational capability, the sender needs to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 40 publications
0
4
0
Order By: Relevance
“…The studies in [24]- [27] have investigated the latency minimization problem for secure offloading MEC system. Specifically, in [24], a power allocation algorithm has been provided to achieve an optimal secure data rate and reduce the whole task latency of both communication and computation. The authors in [25] have investigated PLS in a NOMA-based MEC system with hybrid SIC decoding.…”
Section: ) Secure Mec Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…The studies in [24]- [27] have investigated the latency minimization problem for secure offloading MEC system. Specifically, in [24], a power allocation algorithm has been provided to achieve an optimal secure data rate and reduce the whole task latency of both communication and computation. The authors in [25] have investigated PLS in a NOMA-based MEC system with hybrid SIC decoding.…”
Section: ) Secure Mec Systemsmentioning
confidence: 99%
“…As shown in Fig. 4, we consider a secure MEC offloading scenario where an eavesdropper with a single antenna near the BS can overhear the messages transmitting from helpers to the BS [24]. Specifically, this eavesdropper is passive and never transmit signal and attempt to intercept communications between helpers and the MEC server.…”
Section: B Secure Offloading In Mec Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…This advanced and modern technology is based on endpoints that can store data with low power consumption. Safety is mediated through UAV (unmanned aerial vehicle) devices, i.e., drones that monitor data transmission [29].…”
Section: Modern City Models Information Panels and Networkmentioning
confidence: 99%