ICC 2019 - 2019 IEEE International Conference on Communications (ICC) 2019
DOI: 10.1109/icc.2019.8761166
|View full text |Cite
|
Sign up to set email alerts
|

Physical-Layer Assisted Privacy-Preserving Offloading in Mobile-Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 23 publications
0
10
0
Order By: Relevance
“…Similarly, He et al [30] developed a constrained Markov decision process based privacy-aware task offloading scheduling algorithm, which achieves the best possible delay and energy consumption with a high level of privacy. To solve the risk of disclosing possibly sensitive user data to eavesdroppers, He et al [31] studied a novel physical-layer assisted privacypreserving offloading scheme, in which the edge server proactively broadcasts jamming signals to impede eavesdropping attack and leverages full-duplex communication technique to effectively suppress the self-interference. In work [32], an energy-efficient computation offloading method with privacy preservation, was proposed to improve the load balance and energy consumption of all the edge nodes in edge computing-enabled 5G networks.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, He et al [30] developed a constrained Markov decision process based privacy-aware task offloading scheduling algorithm, which achieves the best possible delay and energy consumption with a high level of privacy. To solve the risk of disclosing possibly sensitive user data to eavesdroppers, He et al [31] studied a novel physical-layer assisted privacypreserving offloading scheme, in which the edge server proactively broadcasts jamming signals to impede eavesdropping attack and leverages full-duplex communication technique to effectively suppress the self-interference. In work [32], an energy-efficient computation offloading method with privacy preservation, was proposed to improve the load balance and energy consumption of all the edge nodes in edge computing-enabled 5G networks.…”
Section: Related Workmentioning
confidence: 99%
“…In [11], the physical layer security and non-orthogonal multiple access (NOMA) were adopted and the secure computation efficiency maximization problem was investigated. In [12], the MEC server proactively transmitted jamming signals to prevent information leakage, and the full-duplex communication technique was adopted to suppress the self-interference. In [13], physical layer security and NOMA were adopted to minimize the weighted sum-energy consumption and the secrecy outage probability of the MDs, respectively.…”
Section: A Relative Workmentioning
confidence: 99%
“…where B and p u are the channel bandwidth and transmit power of the MD, respectively. The power consumption of the MD is modeled as υf 3 (J/s), where υ is a constant factor determined by the switched capacitance of the MD [12]. Finally, after the computation at the SBS, the MD downloads the computation result at the last time interval with length τ 3 .…”
Section: B Computation Modelmentioning
confidence: 99%
“…Hence, the MD may not be friendly, i.e., it may be a potential eavesdropper to eavesdrop the PT's transmission. To avoid the PT's information leakage, we adopt physical layer security technique, which exploits the characteristics of wireless channels to guarantee the secure transmission of users [19]- [21]. The secrecy rate for the PT is given as…”
Section: Problem Formulationmentioning
confidence: 99%