A hybrid resource allocation method for fog computing IoT physical layer security
A physical layer security and resource allocation technology, applied in the field of mixed resource allocation, can solve the problems of complex implementation process of high-level fog computing security policies, less failure to mix security resource allocation, and discussion, so as to reduce data leakage and prevent malicious Bugs eavesdrop on useful information and enhance the effect of confidentiality capacity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] The present invention will be further described below in conjunction with the accompanying drawings, such as figure 1 As shown, the hybrid resource configuration method for fog computing IoT physical layer security designed by the present invention includes the following steps:
[0044] Step 1: Establish a secure fog computing IoT system model
[0045] Consider a fog computing IoT system with K fog nodes, D IoT users, and L passive eavesdroppers. use Represents the data tasks that each IoT user has a delay requirement, where S d Indicates the size of the data task, C d Indicates the CPU cycles required to process data tasks, is the maximum allowable delay threshold. There are W orthogonal spectrum resource blocks in the network, each IoT user occupies one spectrum resource block and transmits data tasks to the corresponding fog nodes assigned by the cloud service provider, using χ d,k ∈{0,1} indicates whether the data task of the d-th IoT user is assigned to the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


