当前位置: X-MOL 学术IEEE Trans. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Legitimate Surveillance of Suspicious Computation Offloading in Mobile Edge Computing Networks
IEEE Transactions on Communications ( IF 7.2 ) Pub Date : 2022-02-16 , DOI: 10.1109/tcomm.2022.3151767
Ding Xu 1 , Hongbo Zhu 1
Affiliation  

In this paper, the legitimate surveillance of a suspicious mobile edge computing (MEC) network consisting of a suspicious edge server (SES) and multiple suspicious users (SUs), in the presence of a full-duplex monitor is studied. Each SU has a computation task to complete within a time deadline and can completely or partially offload the task to SES, while the monitor can either jam or assist the suspicious communications during task uploading and result downloading. With the heterogeneous offloading model adopted by the SUs, the problem of optimizing the monitor mode and transmit power to maximize the average ratio of successfully eavesdropped tasks, subject to the monitor transmit power constraint and the task completion time deadline constraint is investigated. The problem is solved via exploring the particular problem structure and adopting the sum-of-ratios optimization. Simulation results show that the proposed algorithm significantly outperforms the benchmark algorithms, especially for the SUs with partial offloading. It is also shown that the proposed algorithm is of low-complexity and achieves almost the same performance as the high-complexity optimal algorithm. Besides, compared to the SUs with binary offloading, the eavesdropping performance for the SUs with partial offloading is shown to be much better.

中文翻译:


对移动边缘计算网络中可疑计算卸载的合法监视



本文研究了在全双工监视器存在的情况下对由可疑边缘服务器(SES)和多个可疑用户(SU)组成的可疑移动边缘计算(MEC)网络的合法监视。每个SU都有一个计算任务要在期限内完成,并且可以将任务全部或部分卸载到SES,而监视器可以在任务上传和结果下载期间干扰或协助可疑通信。利用SU采用的异构卸载模型,研究了在监视发射功率约束和任务完成时间期限约束下,优化监视模式和发射功率以最大化成功窃听任务的平均比率的问题。通过探索特定的问题结构并采用比率和优化来解决问题。仿真结果表明,所提出的算法显着优于基准算法,特别是对于具有部分卸载的 SU。实验还表明,所提出的算法复杂度较低,并且与高复杂度优化算法的性能几乎相同。此外,与具有二进制卸载的SU相比,具有部分卸载的SU的窃听性能要好得多。
更新日期:2022-02-16
down
wechat
bug