摘要
移动边缘计算(MEC)系统在恶意用户干扰攻击和窃听的双重威胁下,会带来上行卸载受阻、用户信息泄露、系统能源利用率低等问题.对此,利用物理层安全技术防止窃听,并利用大规模多输入多输出(m MIMO)技术来减少干扰及用户能耗.此外,在时延受限的条件下,通过联合优化用户的卸载决策、发射功率以及卸载速率,实现用户总能耗最小化.针对此非凸的多目标优化问题,首先利用拉格朗日乘数法得到用户卸载数据量的闭合表达式,然后利用迭代算法得到用户最优的发射功率以及最大卸载速率.仿真结果表明,所提出的m MIMO-MEC安全卸载方案在解决干扰和窃听等安全问题的同时,有效地降低了系统的总能耗.
Under the double threat of malicious user jamming and eavesdropping,the mobile edge computing(MEC)system will cause problems such as blocked uplink offloading,user information leakage,and low system energy utilization.To address this problem,this letter proposed to use physical layer security technology to prevent eavesdropping,and use massive multiple input multiple output(mMIMO)technology to reduce interference and user energy consumption.In addition,under the conditions of limited delay,the user’s total energy consumption is minimized by jointly optimizing the user’s offloading method,transmission power,and offloading rate.For this non-convex multi-objective optimization problem,it can be decomposed into multiple sub-optimal sub-problems.Firstly,the Lagrange multiplier method is used to obtain a closed expression of the user’s offloading data bits,and then the iterative algorithm is used to obtain the user’s optimal transmit power and maximum offloading rate.Simulation results show that the proposed new m MIMO-MEC secure offloading scheme can effectively reduce the total energy consumption of the system while solving interference and eavesdropping security issues.
作者
赵伟
王斌
鲍慧
赵品芳
李保罡
ZHAO Wei;WANG Bin;BAO Hui;ZHAO Pin-fang;LI Bao-gang(Department of Electronic and Communication Engineering,North China Electric Power University,Baoding 071003,China;Hebei Key Laboratory of Power Internet of Things Technology,North China Electric Power University,Baoding 071003,China)
出处
《北京邮电大学学报》
EI
CAS
CSCD
北大核心
2020年第6期126-131,共6页
Journal of Beijing University of Posts and Telecommunications
基金
国家自然科学基金项目(61971190,61501185)
河北省自然科学基金项目(F2016502062)
中央高校基本科研业务费专项资金项目(2019MS089)
关键词
移动边缘计算
大规模多输入多输出
干扰攻击
窃听
能耗
mobile edge computing
massive multiple input multiple output
jamming attack
eavesdropping
energy consumption