2019
DOI: 10.1109/access.2019.2934122
|View full text |Cite
|
Sign up to set email alerts
|

Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication

Abstract: In this paper, we investigate the security threats in mobile edge computing (MEC) of Internet of things, and propose a deep-learning (DL)-based physical (PHY) layer authentication scheme which exploits channel state information (CSI) to enhance the security of MEC system via detecting spoofing attacks in wireless networks. Moreover, three gradient descent algorithms are adopted to accelerate the training of deep neural networks, which enables smaller computation overheads and lower energy consumptions. In addi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
34
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 62 publications
(35 citation statements)
references
References 32 publications
0
34
0
Order By: Relevance
“…In an IoT scenario, edge computing provides computational power, secures access to the edge data, reduces latency for time-sensitive applications, supports performance in low-bandwidth environments and eases overall network congestion [ 25 ]. In this way, merging multiple end devices into a single module can significantly reduce the calculation amount of the end device, and edge computing can be implemented [ 6 , 7 , 13 , 14 , 15 , 16 , 17 , 18 ].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…In an IoT scenario, edge computing provides computational power, secures access to the edge data, reduces latency for time-sensitive applications, supports performance in low-bandwidth environments and eases overall network congestion [ 25 ]. In this way, merging multiple end devices into a single module can significantly reduce the calculation amount of the end device, and edge computing can be implemented [ 6 , 7 , 13 , 14 , 15 , 16 , 17 , 18 ].…”
Section: Related Workmentioning
confidence: 99%
“…In past research, edge computing was implemented to ensure the reliability in local, and the communication latency reduced [ 6 , 7 , 13 , 14 , 15 , 16 , 17 , 18 ]. However, in these works of literature, most of them are assisted by an additional device server; this is an additional overhead to the hardware cost and should consider whether it is necessary, for example, Smart Farm, where communication of the network is poor.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…This process of encryption can be described as asymmetric and symmetric depending on the key usage. In detail, the asymmetric method of encryption is essential to complete the process by using a public key [3] and in pertaining to the SKE (Symmetric Key Encryption) the common key will be exchanged among the transceiver nodes. When compared between both the kind of encryption techniques, SKE criteria is found to be effective, simple, and faster for the macro image size, but the key management is crucial for SKE, as the key among the sender and receiver need to be safely communicated in the communication system defending with the untrusted intruder [7,8,9].…”
Section: Introductionmentioning
confidence: 99%