2021
DOI: 10.1007/s11276-020-02537-3
|View full text |Cite
|
Sign up to set email alerts
|

A Fountain-Coding Based Cooperative Jamming Strategy for Secure Service Migration in Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…The data access platform is responsible for classifying and processing the data sent from the edge side. The intelligent AI platform performs big data analysis on the data processed by the data access platform, performs calculations and modeling, and builds a historical database [ 28 ]. The container mirroring platform is responsible for backing up various data and performing functional analysis.…”
Section: Analysis Of the Theory And Methods Of Ec Applied To Urban Sc...mentioning
confidence: 99%
“…The data access platform is responsible for classifying and processing the data sent from the edge side. The intelligent AI platform performs big data analysis on the data processed by the data access platform, performs calculations and modeling, and builds a historical database [ 28 ]. The container mirroring platform is responsible for backing up various data and performing functional analysis.…”
Section: Analysis Of the Theory And Methods Of Ec Applied To Urban Sc...mentioning
confidence: 99%
“…It is more applicable for one-to-one data delivery than one-to-many data delivery due to large number of feedbacks needed to be sent by the receivers to the sender thereby consuming more bandwidth and delay. Also, there is a variety of applications of LT codes including robust distributed storage, delivery of streaming content, delivery of content to mobile clients in wireless networks, peer-to-peer applications and delivery of content along multiple paths to ensure resiliency to network disruptions [18][19][20][21][22][23]. A distributed storage system can be any of the three types of storage: block, file, or object.…”
Section: Applicationsmentioning
confidence: 99%
“…Erasure codes, specifically fountain codes, are rateless in the sense that they do not exhibit a fixed code rate but are adapted to the channel conditions. The original data are split into k equal blocks, and then encoded independently and randomly, according to a degree distribution which determines the number of blocks to be exclusive-or-ed into n encoded blocks using an (n, k) maximum distance separable code [16]; this is referred to as the (n, k) fountain code (see Figure 1). One of the properties of fountain coding is that the receiver can retrieve the original transport block (TB) from any subset (k + ) of encoded blocks; where 0 ≤ ≤ n − k. Thus, the decoder starts decoding the message once the first k encoded blocks are received using the sum-product algorithm [16].…”
Section: Reliable Low-latency Fronthaul Modelmentioning
confidence: 99%