Secrecy Offloading Rate Maximization for Multi-Access Mobile Edge Computing Networks
This letter considers a multi-access mobile edge computing (MEC) network consisting of multiple users, multiple base stations, and a malicious eavesdropper. Specifically, the users adopt the partial offloading strategy by partitioning the computation task into several parts. One is executed locally...
Saved in:
Published in | IEEE communications letters Vol. 25; no. 12; pp. 3800 - 3804 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.12.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1089-7798 1558-2558 |
DOI | 10.1109/LCOMM.2021.3114772 |
Cover
Loading…
Abstract | This letter considers a multi-access mobile edge computing (MEC) network consisting of multiple users, multiple base stations, and a malicious eavesdropper. Specifically, the users adopt the partial offloading strategy by partitioning the computation task into several parts. One is executed locally and the others are securely offloaded to multiple MEC servers integrated into the base stations by leveraging the physical layer security to combat the eavesdropping. We jointly optimize power allocation, task partition, subcarrier allocation, and computation resource to maximize the secrecy offloading rate of the users, subject to communication and computation resource constraints. Numerical results demonstrate that our proposed schemes outperform the benchmark schemes substantially and emphasize the necessity of conducting computation offloading over multiple MEC servers. |
---|---|
AbstractList | This letter considers a multi-access mobile edge computing (MEC) network consisting of multiple users, multiple base stations, and a malicious eavesdropper. Specifically, the users adopt the partial offloading strategy by partitioning the computation task into several parts. One is executed locally and the others are securely offloaded to multiple MEC servers integrated into the base stations by leveraging the physical layer security to combat the eavesdropping. We jointly optimize power allocation, task partition, subcarrier allocation, and computation resource to maximize the secrecy offloading rate of the users, subject to communication and computation resource constraints. Numerical results demonstrate that our proposed schemes outperform the benchmark schemes substantially and emphasize the necessity of conducting computation offloading over multiple MEC servers. |
Author | Yao, Jianping Quek, Tony Q. S. Bao, Huiqi Yin, Li Zhao, Mingxiong |
Author_xml | – sequence: 1 givenname: Mingxiong orcidid: 0000-0001-9499-5456 surname: Zhao fullname: Zhao, Mingxiong email: mx_zhao@ynu.edu.cn organization: Engineering Research Center of Cyberspace, National Pilot School of Software, Yunnan University, Kunming, China – sequence: 2 givenname: Huiqi surname: Bao fullname: Bao, Huiqi organization: Engineering Research Center of Cyberspace, National Pilot School of Software, Yunnan University, Kunming, China – sequence: 3 givenname: Li surname: Yin fullname: Yin, Li organization: Engineering Research Center of Cyberspace, National Pilot School of Software, Yunnan University, Kunming, China – sequence: 4 givenname: Jianping orcidid: 0000-0003-2475-1450 surname: Yao fullname: Yao, Jianping email: yaojp@gdut.edu.cn organization: School of Information Engineering, Guangdong University of Technology, Guangzhou, China – sequence: 5 givenname: Tony Q. S. orcidid: 0000-0002-4037-3149 surname: Quek fullname: Quek, Tony Q. S. email: tonyquek@sutd.edu.sg organization: ISTD Pillar, Singapore University of Technology and Design, Singapore |
BookMark | eNp9kE1PAjEQhhuDiYD-Ab1s4nmx7bJt90gIfiSsJIrnTVumpLhssS1R_PUuH_HgwcvMHN5nZvL0UKdxDSB0TfCAEFzcTcezshxQTMkgI2TIOT1DXZLnIqVt6bQzFkXKeSEuUC-EFcZY0Jx00fwVtAe9S2bG1E4ubLNMXmSEpJRfdm2_ZbSuSYzzSbmto01HWkMISemUrSGZLJaQjN16s4178Bnip_Pv4RKdG1kHuDr1Pnq7n8zHj-l09vA0Hk1TTYs8pmyoM0klVsCV4WAUVmyhKBitpGaAcWaIKjhjgmltuMkLTtXQEBCFZjmhWR_dHvduvPvYQojVym19056sKMMiZ4Rx0aboMaW9C8GDqTberqXfVQRXe3vVwV61t1ed7LWQ-ANpGw8yope2_h-9OaIWAH5vFfmwfUZkP9y7gDc |
CODEN | ICLEF6 |
CitedBy_id | crossref_primary_10_1016_j_eswa_2024_124455 crossref_primary_10_1109_JIOT_2024_3351137 crossref_primary_10_1109_TWC_2023_3245637 crossref_primary_10_1016_j_pmcj_2022_101652 crossref_primary_10_1109_TMC_2024_3486995 crossref_primary_10_1016_j_jpdc_2023_04_004 crossref_primary_10_1109_TITS_2022_3205175 crossref_primary_10_1016_j_adhoc_2023_103342 crossref_primary_10_1109_TGCN_2021_3118611 crossref_primary_10_1109_JSYST_2023_3242676 crossref_primary_10_1155_2022_5230594 |
Cites_doi | 10.1109/LWC.2019.2959579 10.1109/TCOMM.2019.2962479 10.1109/TVT.2021.3108508 10.1109/TWC.2021.3086521 10.1109/TVT.2020.2996254 10.1109/LWC.2018.2845882 10.1109/MCOM.2018.1701069 10.1109/TVT.2019.2924437 10.1109/TCOMM.2006.877962 10.1109/JSYST.2020.3009723 10.1109/LCOMM.2018.2889062 10.1109/TCOMM.2020.3025910 10.1109/TWC.2020.2979456 10.1109/TWC.2021.3051772 10.1109/TCOMM.2020.3044085 10.1109/TCOMM.2016.2599530 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
DBID | 97E RIA RIE AAYXX CITATION 7SP 8FD L7M |
DOI | 10.1109/LCOMM.2021.3114772 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Electronics & Communications Abstracts Technology Research Database Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-2558 |
EndPage | 3804 |
ExternalDocumentID | 10_1109_LCOMM_2021_3114772 9546788 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61801418 funderid: 10.13039/501100001809 – fundername: Basic and Applied Basic Research Foundation of Guangdong Province; Guangdong Basic and Applied Basic Research Foundation grantid: 2021A1515011645; 2021A1515110295 funderid: 10.13039/501100021171 – fundername: Science and Technology Program of Guangzhou grantid: 202102020332 – fundername: Open Foundation of Key Laboratory in Software Engineering of Yunnan Province grantid: 2020SE316 |
GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IES IFIPE IFJZH IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS TN5 VH1 AAYOK AAYXX CITATION RIG 7SP 8FD L7M |
ID | FETCH-LOGICAL-c295t-64c3a2a0be7bf7efb0b6db2efcbac6e003f1b976686ccf7f5972b4f1e89c65123 |
IEDL.DBID | RIE |
ISSN | 1089-7798 |
IngestDate | Mon Jun 30 10:15:58 EDT 2025 Tue Jul 01 02:38:28 EDT 2025 Thu Apr 24 22:53:59 EDT 2025 Wed Aug 27 05:11:51 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 12 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c295t-64c3a2a0be7bf7efb0b6db2efcbac6e003f1b976686ccf7f5972b4f1e89c65123 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-9499-5456 0000-0003-2475-1450 0000-0002-4037-3149 |
PQID | 2608561678 |
PQPubID | 85419 |
PageCount | 5 |
ParticipantIDs | crossref_citationtrail_10_1109_LCOMM_2021_3114772 proquest_journals_2608561678 ieee_primary_9546788 crossref_primary_10_1109_LCOMM_2021_3114772 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-12-01 |
PublicationDateYYYYMMDD | 2021-12-01 |
PublicationDate_xml | – month: 12 year: 2021 text: 2021-12-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE communications letters |
PublicationTitleAbbrev | LCOMM |
PublicationYear | 2021 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 ref14 bertsekas (ref16) 1999 ref11 ref10 ref2 ref1 ref17 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
References_xml | – ident: ref6 doi: 10.1109/LWC.2019.2959579 – ident: ref17 doi: 10.1109/TCOMM.2019.2962479 – ident: ref2 doi: 10.1109/TVT.2021.3108508 – ident: ref13 doi: 10.1109/TWC.2021.3086521 – ident: ref5 doi: 10.1109/TVT.2020.2996254 – year: 1999 ident: ref16 publication-title: Nonlinear Programming – ident: ref4 doi: 10.1109/LWC.2018.2845882 – ident: ref1 doi: 10.1109/MCOM.2018.1701069 – ident: ref11 doi: 10.1109/TVT.2019.2924437 – ident: ref15 doi: 10.1109/TCOMM.2006.877962 – ident: ref8 doi: 10.1109/JSYST.2020.3009723 – ident: ref14 doi: 10.1109/LCOMM.2018.2889062 – ident: ref9 doi: 10.1109/TCOMM.2020.3025910 – ident: ref7 doi: 10.1109/TWC.2020.2979456 – ident: ref10 doi: 10.1109/TWC.2021.3051772 – ident: ref3 doi: 10.1109/TCOMM.2020.3044085 – ident: ref12 doi: 10.1109/TCOMM.2016.2599530 |
SSID | ssj0008251 |
Score | 2.4253297 |
Snippet | This letter considers a multi-access mobile edge computing (MEC) network consisting of multiple users, multiple base stations, and a malicious eavesdropper.... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 3800 |
SubjectTerms | Computation offloading Eavesdropping Edge computing Energy consumption Mobile computing Multi-access mobile edge computing (MEC) Optimization physical layer security Quality of service Radio equipment Radio spectrum management Resource management Secrecy aspects secrecy offloading rate maximization Security Servers Task analysis |
Title | Secrecy Offloading Rate Maximization for Multi-Access Mobile Edge Computing Networks |
URI | https://ieeexplore.ieee.org/document/9546788 https://www.proquest.com/docview/2608561678 |
Volume | 25 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB5sT3rwVcX6Igdvum33lWyOUlpE3Ao-wNuSpImItSt2C-qvd5LdLb4QbwubLCGTmfm-zTwAjpjwxTikxgtDpjyE1GNUKSmQpQjOYmRvwliimI7o2W10fhffLcHJIhdGa-2Cz3THPrq7_HGu5vZXWZfHqNZJ0oAGHrMyV2thdW0KZhlMzxEx8qROkOnx7kX_Mk2RCgY-MlQ_Yiz44oRcV5Ufptj5l-EapPXKyrCSx868kB31_q1o43-Xvg6rFdAkp-XJ2IAlPd2ElU_lB1twc20xo3ojl8ZMchdMT64Qe5JUvD48VQmaBFEtcWm63qlrrkjSXKIpIYPxvSZlUwg7cVTGk8-24HY4uOmfeVWXBU8FPC48GqlQBKInNZOGaSN70vaY0kZJoahGrTe-RNBCE6qUYQYZSCAj4-uEK4pwIdyG5jSf6h0gFH1_zKUfxTKOjJYyoaFiKBpmNKM6aoNfb3umqhLkthPGJHNUpMczJ6rMiiqrRNWG48Wc57IAx5-jW3bvFyOrbW_Dfi3drNLRWYZMLkH0iO93f5-1B8v222Xwyj40i5e5PkAIUshDd_Y-ABlG2A4 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEB60HtSDb7FaNQdvurX7SjbHUipVuxW0grclSRMRayu2BfXXO8luiy_E28Jm2JDJZL5vMw-AIyZ80Qup8cKQKQ8hdQ9NSgpkKYKzGNmbMJYoph3auo0u7uK7OTiZ5cJorV3wma7aR3eX3xuqif1VdspjNOskmYcF9PtRnGdrzc5dm4SZh9NzxIw8mabI1Phpu3GVpkgGAx85qh8xFnxxQ66vyo_D2HmYs1VIp3PLA0seq5OxrKr3b2Ub_zv5NVgpoCap53tjHeb0YAOWPxUg3ITujUWN6o1cGdMfunB6co3ok6Ti9eGpSNEkiGuJS9T16q69IkmHEg8T0uzda5K3hbCCnTyifLQFt2fNbqPlFX0WPBXweOzRSIUiEDWpmTRMG1mTtsuUNkoKRTXavfElwhaaUKUMM8hBAhkZXydcUQQM4TaUBsOB3gFC0fvHXPpRLOPIaCkTGiqGqmFGM6qjMvjTZc9UUYTc9sLoZ46M1HjmVJVZVWWFqspwPJN5zktw_Dl60679bGSx7GWoTLWbFVY6ypDLJYgf8f3u71KHsNjqpu2sfd653IMl-508lKUCpfHLRO8jIBnLA7cPPwCS6ttb |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secrecy+Offloading+Rate+Maximization+for+Multi-Access+Mobile+Edge+Computing+Networks&rft.jtitle=IEEE+communications+letters&rft.au=Zhao%2C+Mingxiong&rft.au=Bao%2C+Huiqi&rft.au=Yin%2C+Li&rft.au=Yao%2C+Jianping&rft.date=2021-12-01&rft.pub=IEEE&rft.issn=1089-7798&rft.volume=25&rft.issue=12&rft.spage=3800&rft.epage=3804&rft_id=info:doi/10.1109%2FLCOMM.2021.3114772&rft.externalDocID=9546788 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1089-7798&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1089-7798&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1089-7798&client=summon |