2021
DOI: 10.1109/twc.2021.3051772
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security Assisted Computation Offloading in Intelligently Connected Vehicle Networks

Abstract: In this paper, we propose a secure computation offloading scheme (SCOS) in intelligently connected vehicle (ICV) networks, aiming to minimize overall latency of computing via offloading part of computational tasks to nearby servers in small cell base stations (SBSs), while securing the information delivered during offloading and feedback phases via physical layer security. Existing computation offloading schemes usually neglected time-varying characteristics of channels and their corresponding secrecy rates, r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 46 publications
(21 citation statements)
references
References 53 publications
(94 reference statements)
1
20
0
Order By: Relevance
“…We can linearize the processing delay term in R den i using z i . Based on z i and Theorem 1, problem (P2) can be reformulated as (23), shown at the bottom of this page.…”
Section: A Problem Transformationmentioning
confidence: 99%
See 3 more Smart Citations
“…We can linearize the processing delay term in R den i using z i . Based on z i and Theorem 1, problem (P2) can be reformulated as (23), shown at the bottom of this page.…”
Section: A Problem Transformationmentioning
confidence: 99%
“…In other words, the secrecy level provided by PLS will not be compromised by the mobile devices' 0000-0000/00$00.00 © 2021 IEEE limited computation resources [19]. Recently, many works on MEC-based computation offloading consider eavesdropping attacks and exploit the nature of wireless channels in PLS to enhance security [4,5,[20][21][22][23][24][25][26]. Most of these works have focused on the eavesdropping scenario with only a single eavesdropper in MEC networks [4,5,[20][21][22][23][24].…”
mentioning
confidence: 99%
See 2 more Smart Citations
“…Artificial noise is also used in intelligent transportation systems. For instance, it can be exploited to guarantee a secure communication while offloading part of the data from increased network quality of service [141]. Furthermore, multiple vehicles can be exploited to cooperatively generate noise schemes to secure the communication [142].…”
Section: B Security Solutions Challenges and Gapsmentioning
confidence: 99%