4.7 Article

Reconfigurable Intelligent Surface-Assisted Secure Mobile Edge Computing Networks

期刊

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
卷 71, 期 6, 页码 6647-6660

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2022.3162044

关键词

Task analysis; Security; Wireless communication; Communication system security; Array signal processing; Optimization; Servers; Computation efficiency; mobile edge computing; reconfigurable intelligent surface; security

资金

  1. JSPS KAKENHI [JP20F20080]
  2. National Natural Science Foundation of China [62001357]
  3. Nanyang Technological University (NTU) Startup Grant
  4. Guangdong Basic and Applied Basic Research Foundation [2020 A1515110079]
  5. China Postdoctoral Science Foundation [2021M692501]
  6. Fundamental Research Funds for the Central Universities [XJS210107]
  7. Chile CONICYT FONDECYT Regular Project [1181809]
  8. Chile CONICYT FONDEF Project [ID16I10466]
  9. China Hunan Provincial Nature Science Foundation Project [2018JJ253]

向作者/读者索取更多资源

This paper proposes a reconfigurable intelligent surface (RIS)-assisted secure MEC network framework to enhance task offloading security. By jointly optimizing various parameters, the max-min computation efficiency is achieved. Numerical results demonstrate the performance gain of the proposed framework compared to existing methods.
Mobile edge computing (MEC) has been recognized as a viable technology to satisfy low-delay computation requirements for resource-constrained Internet of things (IoT) devices. Nevertheless, the broadcast feature of wireless electromagnetic communications may lead to the security threats to IoT devices. In order to enhance the task offloading security, this paper proposes a reconfigurable intelligent surface (RIS)-assisted secure MEC network framework. Furthermore, we investigate the max-min computation efficiency problem under the secure computation rate requirements, by jointly optimizing the local computing frequencies and transmission power of IoT devices, time-slot assignment, and phase beamforming of the RIS. To solve the formulated non-convex problem, we further develop an iterative algorithm, in which the Dinkelbach-type method and block coordinate descent (BCD) technique are utilized to tackle the fractional objective function and coupled optimization variables, respectively. In particular, the successive convex approximation (SCA) and penalty function-based methods are exploited to solve the transmit power control and reflecting beamforming optimization subproblems, respectively, and the closed-form expression for local computing frequencies optimization subproblem is derived. Numerical results quantify the performance gain achieved by the proposed RIS-assisted secure MEC networks, when compared to existing benchmark methods.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Engineering, Electrical & Electronic

Predictive and Adaptive Deep Coding for Wireless Image Transmission in Semantic Communication

Wenyu Zhang, Haijun Zhang, Hui Ma, Hua Shao, Ning Wang, Victor C. M. Leung

Summary: This paper proposes a predictive and adaptive deep coding (PADC) framework that achieves flexible code rate optimization with a given target transmission quality requirement. By using a variable code length enabled DeepJSCC model, an Oracle Network model, and a CR optimizer, PADC can minimize bandwidth consumption while guaranteeing the PSNR constraint for each image data in wireless image transmission tasks.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2023)

Article Biochemical Research Methods

Knowledge graph embedding for profiling the interaction between transcription factors and their target genes

Yang-Han Wu, Yu-An Huang, Jian-Qiang Li, Zhu-Hong You, Peng-Wei Hu, Lun Hu, Victor C. M. Leung, Zhi-Hua Du

Summary: The interaction between transcription factors and target genes is a vital part of the human gene regulation network. However, many of these interactions have unconfirmed types. This research presents a graph-based prediction model called KGE-TGI, trained on a specially constructed knowledge graph, that relies on topology information rather than gene expression data. The proposed method achieved high AUC values in link prediction and link type classification tasks, outperforming existing methods and demonstrating the importance of incorporating knowledge information.

PLOS COMPUTATIONAL BIOLOGY (2023)

Article Computer Science, Information Systems

Resource Scheduling for Intelligent Reflecting Surface-Assisted Full-Duplex Wireless-Powered Communication Networks With Phase Errors

Sun Mao, Lei Liu, Ning Zhang, Jie Hu, Kun Yang, Mianxiong Dong, Kaoru Ota

Summary: This article investigates the joint phase beamforming design and resource management for intelligent reflecting surface (IRS)-assisted full-duplex wireless-powered communication networks (FD-WPCNs). An alternating optimization method is developed to obtain the optimal solution by solving two subproblems iteratively. Numerical results show the performance of the proposed method and the benefits introduced by the IRS technique compared to benchmark methods.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Defed: An Edge-Feature-Enhanced Image Denoised Network Against Adversarial Attacks for Secure Internet of Things

Yang Xiao, Chengjia Yan, Shuo Lyu, Qingqi Pei, Ximeng Liu, Ning Zhang, Mianxiong Dong

Summary: With the development of IoT, the use of IoT devices has increased, resulting in the generation of large volumes of image data for tracing and recording user behavior. Deep neural networks (DNNs) have become popular for accurately analyzing this data and improving user experience. However, DNN models are vulnerable to adversarial attacks, which poses a risk to practical applications. This study proposes a defense approach called Defed that incorporates edge feature information into a denoised network to defend against adversarial attacks in image area.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Engineering, Electrical & Electronic

Resource Allocation for Cell-Free Massive MIMO-Aided URLLC Systems Relying on Pilot Sharing

Qihao Peng, Hong Ren, Mianxiong Dong, Maged Elkashlan, Kai-Kit Wong, Lajos Hanzo

Summary: This study focuses on resource allocation for cell-free massive MIMO-aided URLLC systems. Pilot reuse and joint optimization of pilot length and pilot allocation are proposed to maximize the number of admitted devices. The pilot power and transmit power are optimized to satisfy the devices' requirements. Lower bounds of ergodic data rate under finite channel blocklength are derived. A novel pilot assignment algorithm is proposed. The proposed pilot allocation and power allocation strategies show significant performance improvements.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2023)

Article Engineering, Civil

On Vehicular Ad-Hoc Networks With Full-Duplex Radios: An End-to-End Delay Perspective

Momiao Zhou, Lei Liu, Yanshi Sun, Kan Wang, Mianxiong Dong, Mohammed Atiquzzaman, Schahram Dustdar

Summary: The aim of this paper is to present a groundwork on the delay-minimized routing problem in a vehicular ad-hoc network (VANET) where some of the vehicles are equipped with full-duplex (FD) radios. Two routing methods, namely graph-based method and deep reinforcement learning (DRL)-based method, are proposed. The graph-based method achieves the exact minimum end-to-end delay, while the DRL-based method is more feasible and achieves near minimum end-to-end delay with proper hyper-parameters.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Electrical & Electronic

CPAHP: Conditional Privacy-Preserving Authentication Scheme With Hierarchical Pseudonym for 5G-Enabled IoV

Jingwei Liu, Chuntian Peng, Rong Sun, Lei Liu, Ning Zhang, Schahram Dustdar, Victor C. M. Leung

Summary: As a representative application scenario of the Internet of Things (IoT), Internet of Vehicles (IoV) plays an important role in intelligent transportation. However, the data traffic exchanged in IoV is vulnerable to privacy leakage. To address this issue, a conditional privacy-preserving authentication scheme with hierarchical pseudonyms (CPAHP), based on elliptic curve Diffie-Hellman (ECDH) problem, is proposed for 5G-enabled IoV. The scheme ensures protection of real identities and movement tracks of vehicles while allowing recovery of malicious vehicles' identities through corresponding pseudonyms. Furthermore, blockchain technology is introduced to facilitate smooth sharing of traffic information among vehicles. The scheme not only meets security requirements but also provides higher computational efficiency.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

Trusted Collaboration for MEC-Enabled VR Video Streaming: A Multi-Agent Reinforcement Learning Approach

Yueqiang Xu, Heli Zhang, Xi Li, F. Richard Yu, Victor C. M. Leung, Hong Ji

Summary: This paper presents a trusted collaboration framework for managing video buffering in VR devices in a distributed environment. By collaboratively processing rendering tasks and using a trust evaluation method for collaborator selection, an optimization problem is solved through joint optimization. Simulation results show that this approach achieves good performance.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

Efficient Resource Allocation in Multi-UAV Assisted Vehicular Networks With Security Constraint and Attention Mechanism

Yuhang Wang, Ying He, F. Richard Yu, Qiuzhen Lin, Victor C. M. Leung

Summary: With the rapid development of intelligent transportation systems, there is an increasing demand for low-latency and high-bandwidth vehicular services. This paper uses multiple UAVs as a supplement to ground networks to relieve communication pressure and models the scenario as a collaborative multi-agent system. The proposed method considers vehicle safety as a priority and uses multi-agent reinforcement learning and attention mechanism to optimize resource allocation.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2023)

Article Computer Science, Artificial Intelligence

Influence Maximization in Complex Networks by Using Evolutionary Deep Reinforcement Learning

Lijia Ma, Zengyang Shao, Xiaocong Li, Qiuzhen Lin, Jianqiang Li, Victor C. M. Leung, Asoke K. Nandi

Summary: This article proposes an evolutionary deep reinforcement learning algorithm called EDRL-IM for influence maximization in complex networks. By combining evolutionary algorithm and deep reinforcement learning algorithm, EDRL-IM outperforms state-of-the-art methods in finding seed nodes.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2023)

Article Computer Science, Information Systems

SIDA: Self-Supervised Imbalanced Domain Adaptation for Sound Enhancement and Cross-Domain WiFi Sensing

Jin Zhang, Yuyan Dai, Jie Chen, Chengwen Luo, Bo Wei, Victor C. M. Leung, Jianqiang Li

Summary: This paper proposes SIDA, a self-supervised imbalanced domain adaptation framework, for sound enhancement and WiFi sensing, which serves as a generic time series domain adaptation solution for IoT systems. SIDA enhances lung sounds and performs human sensing by separately learning the representation and mapping relations of time series signals in minority and majority domains. Experimental results demonstrate that SIDA achieves significant improvements on imbalanced datasets.

PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT (2023)

Article Computer Science, Cybernetics

Multidocument Aspect Classification for Aspect-Based Abstractive Summarization

Ye Wang, Yingmin Zhou, Mengzhu Wang, Zhenghan Chen, Zhiping Cai, Junyang Chen, Victor C. M. Leung

Summary: Multidocument aspect-based summarization aims to generate focused summaries based on target aspects from relevant documents. A two-stage framework is proposed that first discovers the latent relationship among aspects and then uses relevant sentences to generate abstractive summaries. The model utilizes tag mask training strategy to exploit latent dependencies among aspects and improve the interpretability of the model. Experimental results show accurate aspect discovery and improvements in summarization compared to strong baselines.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Engineering, Electrical & Electronic

Performance of Wireless Powered Communication Systems Over Beaulieu-Xie Channels With Nonlinear Energy Harvesters

Adebola Olutayo, Yanjie Dong, Julian Cheng, Jonathan F. Holzman, Victor C. M. Leung

Summary: This study analyzes the performance of wireless powered wireless systems, where wireless devices scavenge energy from downlink sources and use it for communication in the uplink. Two new models are proposed to account for the nonlinear circuitry of energy harvesters and their functioning over multiple line-of-sight and non-line-of-sight channels. The Beaulieu-Xie fading model is introduced to characterize the diversity of these channels. Performance analyses demonstrate a good fit between the proposed models and measured data, with respect to average harvested energy and transmission outage probability.

IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY (2023)

Article Engineering, Multidisciplinary

Improving Rating Prediction in Multi-Criteria Recommender Systems via a Collective Factor Model

Ge Fan, Chaoyun Zhang, Junyang Chen, Paul Li, Yingjie Li, Victor C. M. Leung

Summary: Existing recommendation methods that train independent modules for each rating information may lead to sub-optimal results due to the lack of collaborative learning. We propose a collective model that can learn each sub-score simultaneously to predict users' overall rating, reducing the dependence on specific criterion and improving prediction quality. Experimental results show up to 13.14% lower prediction error compared to baseline approaches.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

暂无数据