NOMA mobile edge computing system construction method with anti-eavesdropping capability

A technology of edge computing and construction method, which is applied in the field of construction of secure NOMA mobile edge computing system, can solve the problem of whether it is difficult and unrealistic to detect eavesdroppers, achieve low latency, ensure safe transmission, and improve spectral efficiency. Effect

Active Publication Date: 2019-03-29
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In fact, in a real eavesdropping scenario, since the eavesdropper is usually passive, it is very difficult to detect the eavesdropper, let alone obtain its channe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • NOMA mobile edge computing system construction method with anti-eavesdropping capability
  • NOMA mobile edge computing system construction method with anti-eavesdropping capability
  • NOMA mobile edge computing system construction method with anti-eavesdropping capability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings.

[0043] In the absence of eavesdropper channel state information, a reasonable way to enhance confidentiality is to use all available resources to guarantee a certain degree of service quality, such as high reliability and low delay of transmission, etc. The invention proposes that under the condition of not knowing the channel state information of the eavesdropper, the user introduces a measure irrelevant to the eavesdropper's channel state information to quantify the user's anti-eavesdropping ability through secret coding, so as to achieve information security transmission. refer to figure 1 , a kind of secure NOMA mobile edge computing system with anti-eavesdropping capability is provided in the embodiment, and the construction of the system includes the following steps:

[0044] Step 1: In the described system, consider the case where ther...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an NOMA mobile edge computing system construction method with anti-eavesdropping capability. In the case that there is an eavesdropper and the channel state information of theeavesdropper is unknown, a user introduces a metric independent of the channel state information of the eavesdropper through secret coding to quantify the anti-eavesdropping ability of the user. Two users simultaneously send respective partial tasks to nearby access points equipped with mobile edge computing servers through NOMA uplinks in a resource block sharing manner and perform fast processing, thereby actively assisting the execution of computing tasks of mobile users, and ensuring the fast execution of the computing tasks with low delay tolerance and high complexity of mobile clients. The NOMA mobile edge computing system construction method disclosed by the invention has the advantages of ensuring secure transmission of information through the anti-eavesdropping ability when the channel state information of the eavesdropper is unknown. According to the NOMA mobile edge computing system construction method disclosed by the invention, a class of interrupt events based on probabilistic analysis is also defined to measure the communication performance of the system and to evaluate the impact of transmitting power and unloading tasks on the system performance.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and in particular relates to a construction method of a secure NOMA mobile edge computing system with anti-eavesdropping capabilities. Background technique [0002] Mobile edge computing (Mobile Edge Computing, MEC) and non-orthogonal multiple access (Non-orthogonal Multiple Access, NOMA) are considered to be promising technologies in the next generation of wireless networks. MEC can calculate a large number of tasks in real time, improve the computing power and energy efficiency of wireless devices, and realize various computing-intensive and low-latency IoT applications. Therefore, MEC has attracted more and more industry and academia. research interests. By deploying MEC servers at the edge of the network such as access points, IoT devices offload heavy computing tasks to access points via wireless links, so that they can be efficiently executed remotely in the MEC system. By ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W24/06H04W28/22H04W52/24H04W52/34H04L29/08
CPCH04L67/10H04W12/02H04W24/06H04W28/22H04W52/241H04W52/346
Inventor 吴伟王新新王保云
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products