2020
DOI: 10.1109/twc.2020.2979456
|View full text |Cite
|
Sign up to set email alerts
|

Physical-Layer Assisted Secure Offloading in Mobile-Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 55 publications
(14 citation statements)
references
References 38 publications
0
14
0
Order By: Relevance
“…Multiple antennas technologies were also used to improve the performance of secure offloading systems. He et al used multiple antennas of SBS to generate AN signals to impede eavesdropping and leverage full-duplex communication technologies to suppress self-interference [33].…”
Section: A Mec Technologiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Multiple antennas technologies were also used to improve the performance of secure offloading systems. He et al used multiple antennas of SBS to generate AN signals to impede eavesdropping and leverage full-duplex communication technologies to suppress self-interference [33].…”
Section: A Mec Technologiesmentioning
confidence: 99%
“…Since H me,1 and H me,2 are independent and identically distributed, we simplify H me,1 and H me,2 as a complex Gaussian random matrix H me . In this paper, we emphasize the secure computation offloading approach and assume that channel estimation is perfect, as what have been assumed in [12], [14], [30]- [33]. However, in practice, perfect CSIs may not be available due to channel estimation and feedback errors.…”
Section: Channel Modelmentioning
confidence: 99%
“…Furthermore, we assume that the eavesdropper knows h EVE ; the EN knows perfectly h EN , h H , and G but only knows an estimate ĥEVE of h EVE . Following the deterministic uncertainty model [22], [23], we assume that hEVE− ĥEVE ĥEVE ≤ , where is an upper bound of the relative estimation error.…”
Section: A Communication Modelmentioning
confidence: 99%
“…Even though physical layer security techniques such as noisy signals and receiver jamming ( [47]) have been utilized to promote the security and privacy of the conventional wireless communication systems [48], there are very few recent works that utilize such techniques. A novel secure offloading scheme based on physical layer has been proposed in Reference [49]. In this work, the edge server broadcasts jamming signals and utilizes full duplex communication to impede the eavesdroppers and reduce the self interference.…”
Section: Related Workmentioning
confidence: 99%