Legitimate Surveillance of Suspicious Computation Offloading in Mobile Edge Computing Networks

In this paper, the legitimate surveillance of a suspicious mobile edge computing (MEC) network consisting of a suspicious edge server (SES) and multiple suspicious users (SUs), in the presence of a full-duplex monitor is studied. Each SU has a computation task to complete within a time deadline and...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on communications Vol. 70; no. 4; pp. 2648 - 2662
Main Authors Xu, Ding, Zhu, Hongbo
Format Journal Article
LanguageEnglish
Published New York IEEE 01.04.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN0090-6778
1558-0857
DOI10.1109/TCOMM.2022.3151767

Cover

Loading…
More Information
Summary:In this paper, the legitimate surveillance of a suspicious mobile edge computing (MEC) network consisting of a suspicious edge server (SES) and multiple suspicious users (SUs), in the presence of a full-duplex monitor is studied. Each SU has a computation task to complete within a time deadline and can completely or partially offload the task to SES, while the monitor can either jam or assist the suspicious communications during task uploading and result downloading. With the heterogeneous offloading model adopted by the SUs, the problem of optimizing the monitor mode and transmit power to maximize the average ratio of successfully eavesdropped tasks, subject to the monitor transmit power constraint and the task completion time deadline constraint is investigated. The problem is solved via exploring the particular problem structure and adopting the sum-of-ratios optimization. Simulation results show that the proposed algorithm significantly outperforms the benchmark algorithms, especially for the SUs with partial offloading. It is also shown that the proposed algorithm is of low-complexity and achieves almost the same performance as the high-complexity optimal algorithm. Besides, compared to the SUs with binary offloading, the eavesdropping performance for the SUs with partial offloading is shown to be much better.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0090-6778
1558-0857
DOI:10.1109/TCOMM.2022.3151767