Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers

Xiazhi Lai, Lisheng Fan, Xianfu Lei, Yansha Deng, George K. Karagiannidis, Arumugam Nallanathan

Research output: Contribution to journalArticlepeer-review

28 Citations (Scopus)

Abstract

In this paper, we investigate a secure mobile edge computing (MEC) network in the presence of multiple eavesdroppers, where multiple users can offload parts of their tasks to the computational access point (CAP). The multiple eavesdroppers may overhear the confidential task offloading, which leads to information leakage. In order to address this issue, we present the minimization problem of the secrecy outage probability (SOP), by jointly taking into account the constraints from the latency and energy consumption. With the aim to improve the system secrecy performance, we then introduce three user selection criteria to choose the best user among multiple ones. Specifically, criterion I maximizes the locally computational capacity, while criterion II and III maximize the secrecy capacity and data rate of main links, respectively. For these criteria, we further analyze the system secrecy performance by deriving analytical and asymptotic expressions for the SOP, from which we can conclude important insights for the system design. Finally, simulation and analytical results are provided to verify the proposed analysis. The results show that the three criteria can efficiently safeguard the MEC networks, compared to the traditional local computing and fully offloading, especially with a large value of user number.

Original languageEnglish
Pages (from-to)500-513
Number of pages14
JournalIEEE TRANSACTIONS ON COMMUNICATIONS
Volume70
Issue number1
DOIs
Publication statusPublished - Jan 2022

Keywords

  • energy consumption
  • latency
  • mobile edge computing
  • secrecy outage probability
  • Secure communication
  • user selection

Fingerprint

Dive into the research topics of 'Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers'. Together they form a unique fingerprint.

Cite this