Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

NOMA multi-user security computing unloading method and system

A computing offloading and multi-user technology, which is applied in the field of NOMA multi-user secure computing offloading, can solve the security threats of computing task offloading, difficulties in key distribution and management, computing task eavesdropping, etc. System security, the effect of improving security

Active Publication Date: 2022-03-25
XIDIAN UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) Due to the broadcasting of wireless communication and the inherent randomness of wireless channels, the computing tasks offloaded to the MEC server may be eavesdropped, and the computing tasks loaded on the device may also be eavesdropped by malicious users, which may affect the security of computing task offloading create a threat
[0008] (2) There are still limitations in the existing work. From the cryptography level, the communication network is protected through encryption, and it is easy to be violently cracked by illegal eavesdroppers to obtain information.
[0009] (3) Physical layer security technology generally requires that the signal transmission channel conditions of legitimate users are better than those of other users. When there are many legitimate users, this condition is difficult to be guaranteed
But in a decentralized network with random access and mobility, the distribution and management of keys is difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • NOMA multi-user security computing unloading method and system
  • NOMA multi-user security computing unloading method and system
  • NOMA multi-user security computing unloading method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. The present invention is applicable to communication scenarios with high communication security requirements such as banks, hospitals, and transportation. For example, in intelligent medical systems, private information such as patient medical records, prescriptions, and treatment plans may be leaked or tampered with during collection, storage, and transmission. In intelligent transportation, private information such as the vehicle's location and driving trajectory also has the risk of being exposed and illegally tracked and used. The present invention can effectively reduce the probability of data leakage and the risk of being eavesdropped. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the pre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of wireless communication, and discloses an NOMA multi-user secure computing unloading method and system, and the method comprises the steps: a user Un generates an original signal xn through channel coding and M-PSK modulation, and carries out the distributed preprocessing; the user group sends respective preprocessing signals to the computing node CN at the same time, and the computing node CN and the eavesdropper E both receive superposed signals from the user group; the computational nodes CN are arranged in a descending order according to the equivalent channel gains between the nodes and the users; the CN decodes the superposed signals in sequence after receiving the superposed signals; after an eavesdropper E receives the superposed signal, the superposed signal cannot be decoded due to a constellation diagram aliasing effect caused by distributed preprocessing. According to the method, the physical layer security performance of multi-user communication transmission can be improved, guarantee is provided for NOMA security transmission of a multi-user computing task, the eavesdropping risk is effectively reduced, and the network performance is improved.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and in particular relates to a NOMA multi-user secure computing unloading method and system. Background technique [0002] At present, with the popularization of the Internet and the rapid development of the Internet of Things, more and more mobile terminals are widely used in people's daily life. The explosive growth trend of mobile device usage is driven by the increase of mobile users and mobile applications. The result of developing a synergy. At the same time, emerging applications such as interactive games, augmented reality, and virtual reality are also widely popularized with the development of 5G technology. It is unrealistic to purely rely on mobile devices to process these applications that require a lot of computing and energy consumption. The limited computing power, communication transmission capacity, and battery life restrict the development of emerging application...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04W12/02H04W28/08
CPCH04W12/02H04L63/0414H04W28/088Y02D30/70
Inventor 贺冰涛曹琳吕璐陈健杨龙
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products