2020
DOI: 10.1088/1742-6596/1659/1/012017
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Communication for Wireless Mobile Edge Computing Based on Artificial Noise and Security Code

Abstract: As increasing threat to wireless mobile edge computing communication and high cost of conventional encryption implement in wireless mobile edge computing environments. The physical layer security has aroused widespread interests to increase the secure transmission and communications of mobile edge computing data communication in wireless networks. This work investigates the mobile edge computing secure communication by MIMO beamforming and artificial noise (AN) system with secure code. From practical considera… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…Comprehensive risk assessments are necessary for organizations to identify and rank potential threats and vulnerabilities unique to 6G networks. By evaluating the likelihood and impact of various dangers, organizations can maximize the efficacy of their cybersecurity efforts by allocating resources and implementing controls proportionate to the amount of risk posed (Lv et al, 2020).…”
Section: Strategic Approaches To Cyber Resiliencementioning
confidence: 99%
“…Comprehensive risk assessments are necessary for organizations to identify and rank potential threats and vulnerabilities unique to 6G networks. By evaluating the likelihood and impact of various dangers, organizations can maximize the efficacy of their cybersecurity efforts by allocating resources and implementing controls proportionate to the amount of risk posed (Lv et al, 2020).…”
Section: Strategic Approaches To Cyber Resiliencementioning
confidence: 99%