Abstract

Under the double threat of malicious user jamming attacks and eavesdropping, mobile edge computing (MEC) systems will have some information security issues, such as uplink offloading is hindered, user information leakage, and low system energy utilization. To address this problem, we propose to use physical layer security technology to prevent eavesdropping, and use massive multiple input multiple output (mMIMO) technology to reduce interference and improve system energy efficiency. In addition, under the conditions of limited delay, the user’s total energy consumption is minimized by jointly optimizing the user’s offloading data bits, transmission power, and offloading rate. For this non-convex multi-objective optimization problem, which can be decomposed into multiple sub-optimal sub-problems. First, the Lagrange multiplier method is used to obtain a closed expression of the user’s offloading data bits, and then the iterative algorithm is used to obtain the user’s optimal transmit power and maximum offloading rate. The simulation results show that, under the premise of ensuring information security, the system’s total energy efficiency of antennas ( $M=128$ ) is improved 30% compared with antennas ( $M=4$ ) when the amount of data reaches $5\times 10^{5}$ bits.

Highlights

  • With the advent of the fifth-generation (5G) era [1], some network applications, real-time and streaming video traffic and internet of things (IoT) related applications have developed rapidly, which brings great challenges to the real-time processing and security of intelligent terminal devices and networks [2], [3]

  • NUMERICAL RESULTS The massive multiple input multiple output (mMIMO)-Mobile edge computing (MEC) secure system was simulated by MATLAB, and the simulation parameters were set as shown in TABLE 1 [14], [28]

  • This paper proves through simulation that under this mMIMO-MEC secure offload system, when the user’s transmit power is 28dBm, the total energy consumption consumed by the system is the lowest

Read more

Summary

INTRODUCTION

With the advent of the fifth-generation (5G) era [1], some network applications, real-time and streaming video traffic and internet of things (IoT) related applications have developed rapidly, which brings great challenges to the real-time processing and security of intelligent terminal devices and networks [2], [3]. In [15], physical layer security technology is used to ensure that offload tasks are not eavesdropped, and system energy consumption is minimized through jointly optimizing computing and communication resource. When using mMIMO technology to perform computation offloading tasks on the uplink, there are information security issues such as passive eavesdropping and malicious user jamming attacks. On the basis of ensuring information security, this paper jointly considers the three stages of uplink channel estimation, uplink data offloading, and edge server computing to jointly optimize the system delay and energy consumption. A. MOTIVATION AND CONTRIBUTIONS previous references have studied eavesdropping security issues when performing computation offloading tasks, they have not considered issues such as blocked uplink offloading and low energy utilization caused by malicious user jamming attacks.

SYSTEM MODEL
UPLINK CHANNEL ESTIMATION
COMPUTATION OFFLOADING MODEL
OPTIMIZING TOTAL ENERGY CONSUMPTION BASED
11: Output
NUMERICAL RESULTS
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.