Secure mobile edge computing networks in the presence of multiple eavesdroppers

X Lai, L Fan, X Lei, Y Deng… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this paper, we investigate a secure mobile edge computing (MEC) network in the
presence of multiple eavesdroppers, where multiple users can offload parts of their tasks to …

Satisfaction-maximized secure computation offloading in multi-eavesdropper MEC networks

S Liu, Y Yu, L Guo, PL Yeoh, B Vucetic… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this paper, we consider a mobile edge computing (MEC)-based secure computation
offloading system, and design a practical multi-eavesdropper model including two specific …

Offloading optimization for low-latency secure mobile edge computing systems

Y Zhou, PL Yeoh, C Pan, K Wang… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
This letter proposes a low-latency secure mobile edge computing (MEC) system where
multiple users offload computing tasks to a base station in the presence of an eavesdropper …

Physical-layer security based mobile edge computing for emerging cyber physical systems

L Chen, S Tang, V Balasubramanian, J Xia… - Computer …, 2022 - Elsevier
This paper studies a secure mobile edge computing (MEC) for emerging cyber physical
systems (CPS), where there exist K eavesdroppers in the network, which can threaten the …

Exploiting physical-layer security for multiuser multicarrier computation offloading

J Xu, J Yao - IEEE wireless communications letters, 2018 - ieeexplore.ieee.org
This letter considers a mobile edge computing system with one access point (AP) serving
multiple users over a multicarrier channel, in the presence of a malicious eavesdropper. In …

Energy-efficient resource allocation for secure NOMA-enabled mobile edge computing networks

W Wu, F Zhou, RQ Hu, B Wang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Mobile edge computing (MEC) has been envisaged as a promising technique in the next-
generation wireless networks. In order to improve the security of computation tasks …

Physical-layer assisted secure offloading in mobile-edge computing

X He, R Jin, H Dai - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
The wireless offloading feature of the recently advocated mobile-edge computing (MEC)
imposes a risk of disclosing private user data to eavesdroppers. Physical-layer security …

Intelligent secure mobile edge computing for beyond 5G wireless networks

S Lai, R Zhao, S Tang, J Xia, F Zhou, L Fan - Physical Communication, 2021 - Elsevier
Computational task offloading at the mobile edge servers is a promising strategy to reduce
latency and energy consumption in 5G wireless networks. In this paper, we study the …

Secrecy-based delay-aware computation offloading via mobile edge computing for internet of things

Y Wu, J Shi, K Ni, L Qian, W Zhu, Z Shi… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Mobile edge computing (MEC), which enables smart terminals to actively offload
computation workloads to computational servers deployed at the edge of networks, has …

Secure cache-aided multi-relay networks in the presence of multiple eavesdroppers

J Xia, L Fan, W Xu, X Lei, X Chen… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
In this paper, we investigate the security of a cache-aided multi-relay communication
network in the presence of multiple eavesdroppers, where each relay can pre-store a part of …