Abstract
In 5G, users can easily enjoy services by accessing the edge devices (EDs) deployed around the base stations. Generally, due to the uneven distribution and mobility of users, one ED is required to serve multiple users simultaneously, that results in the ED overload, seriously affecting the quality of experience (QoE) of the users. By responding to users’ requests, service migration realizes the cross edge device migrations, that dynamically provides services for mobile users, which effectively improves the resource utilization rate of edge servers and the QoE of users. However, during the service migrations, malicious users may deploy pseudo base stations, gateways and other devices to illegally eavesdrop or tamper with user service data, that causes user information loss or disclosure. To prevent these security issues, a fountain-coding based cooperative jamming strategy is proposed in this paper. Specifically, the fountain coding technology is introduced to construct a three-node transmission model, including an original node, a target node and a malicious node, to realize the secure data transmission process in service migration. Besides, a group of relay nodes are employed to carry out cooperative jamming, that deteriorate the illegal eavesdropping quality of malicious nodes on service data. Then secrecy rate and outage probability are utilized to evaluate the security and reliability of the whole service migration. Finally, the theoretical analysis is shown by simulation results.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.