Yu Yan, Tao Jing, Qinghe Gao, Yingzhen Wu, Xiaoxuan Wang
{"title":"物理层安全启用两阶段AP选择计算卸载","authors":"Yu Yan, Tao Jing, Qinghe Gao, Yingzhen Wu, Xiaoxuan Wang","doi":"10.1109/GLOBECOM48099.2022.10000975","DOIUrl":null,"url":null,"abstract":"Physical layer security (PLS) has been widely employed in studies of computation offloading under traditional centralized networks. Distinguished from existing studies of only combating passive eavesdropper, we propose an efficient user-centric secure two-stage (UCSTS) access point (AP) selection method to combat simultaneously active and passive eaves-dropping, which is exploiting the distributed feature of cell-free massive multiple-input-multiple-output (MIMO) scenarios. Furthermore, we propose a novel secure computation task offloading (SCTO) model to guarantee the security of both uplink and downlink transmission. Aiming at reducing total energy consumption with high security, a minimum energy consumption optimization problem is solved by alternative optimization (AO) algorithm. Simulation results show that the proposed model can well combat Eve while reducing the total energy consumption, and the security of the proposed selection method is better than the AN-based scheme.","PeriodicalId":313199,"journal":{"name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Physical Layer Security Enabled Two-Stage AP Selection for Computation Offloading\",\"authors\":\"Yu Yan, Tao Jing, Qinghe Gao, Yingzhen Wu, Xiaoxuan Wang\",\"doi\":\"10.1109/GLOBECOM48099.2022.10000975\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Physical layer security (PLS) has been widely employed in studies of computation offloading under traditional centralized networks. Distinguished from existing studies of only combating passive eavesdropper, we propose an efficient user-centric secure two-stage (UCSTS) access point (AP) selection method to combat simultaneously active and passive eaves-dropping, which is exploiting the distributed feature of cell-free massive multiple-input-multiple-output (MIMO) scenarios. Furthermore, we propose a novel secure computation task offloading (SCTO) model to guarantee the security of both uplink and downlink transmission. Aiming at reducing total energy consumption with high security, a minimum energy consumption optimization problem is solved by alternative optimization (AO) algorithm. Simulation results show that the proposed model can well combat Eve while reducing the total energy consumption, and the security of the proposed selection method is better than the AN-based scheme.\",\"PeriodicalId\":313199,\"journal\":{\"name\":\"GLOBECOM 2022 - 2022 IEEE Global Communications Conference\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"GLOBECOM 2022 - 2022 IEEE Global Communications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GLOBECOM48099.2022.10000975\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOBECOM48099.2022.10000975","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Physical Layer Security Enabled Two-Stage AP Selection for Computation Offloading
Physical layer security (PLS) has been widely employed in studies of computation offloading under traditional centralized networks. Distinguished from existing studies of only combating passive eavesdropper, we propose an efficient user-centric secure two-stage (UCSTS) access point (AP) selection method to combat simultaneously active and passive eaves-dropping, which is exploiting the distributed feature of cell-free massive multiple-input-multiple-output (MIMO) scenarios. Furthermore, we propose a novel secure computation task offloading (SCTO) model to guarantee the security of both uplink and downlink transmission. Aiming at reducing total energy consumption with high security, a minimum energy consumption optimization problem is solved by alternative optimization (AO) algorithm. Simulation results show that the proposed model can well combat Eve while reducing the total energy consumption, and the security of the proposed selection method is better than the AN-based scheme.