2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS) 2021
DOI: 10.1109/icccs52626.2021.9449190
|View full text |Cite
|
Sign up to set email alerts
|

Secure Offloading Design in Multi-user Mobile-Edge Computing Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…In [21], a NOMAassisted secure computation offloading has been investigated under the eavesdropping attack, in which a wireless user forms a NOMA pair with an edge-computing user to provide cooperative jamming to the eavesdropper while gaining the opportunity of sending its data. In [22], an optimization problem has been introduced to minimize the weighted sum of the execution latency and energy consumption subject to communication and computation resource constraints for a MEC system consisting of one MEC server, multiple mobile devices and one eavesdropper. In [23], the authors have examined a deep reinforcement learning-based mobile offloading scheme for edge computing against jamming attacks and interference.…”
Section: ) Secure Mec Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [21], a NOMAassisted secure computation offloading has been investigated under the eavesdropping attack, in which a wireless user forms a NOMA pair with an edge-computing user to provide cooperative jamming to the eavesdropper while gaining the opportunity of sending its data. In [22], an optimization problem has been introduced to minimize the weighted sum of the execution latency and energy consumption subject to communication and computation resource constraints for a MEC system consisting of one MEC server, multiple mobile devices and one eavesdropper. In [23], the authors have examined a deep reinforcement learning-based mobile offloading scheme for edge computing against jamming attacks and interference.…”
Section: ) Secure Mec Systemsmentioning
confidence: 99%
“…While designing a secure offloading mechanism in the proposed MEC framework, we define a constraint based on secrecy rate to diminish the offloading information leakage to the eavesdropper. According to [6] [19] [22] and [24], the transmission delay by considering the security constraint is expressed as follows:…”
Section: Algorithm 2 Optimizing the Overall Delay Based On Interior-p...mentioning
confidence: 99%
“…One of the most straightforward methods to solve optimization problems in NOMA-MEC networks is based on one-dimension search algorithms, such as Golden section search (GSS) or Fibonacci search [10,29,30]. For instance, Wu et al [10] proposed an efficient layered algorithm based on a GSS to find the optimal offloading parameter that minimizes system delay [10].…”
Section: Related Workmentioning
confidence: 99%