Secure Computation Offloading and Service Caching in Mobile Edge Computing Networks

Mengru Wu, Kexin Li, Liping Qian, Yuan Wu, Inkyu Lee

Research output: Contribution to journalArticlepeer-review

Abstract

Mobile edge computing (MEC) enables the caching of various services close to users, thereby reducing service delay for emerging applications. However, realizing efficient and secure computation offloading is challenging due to the limited storage capacity of MEC servers and the offloading security issue arising from the open nature of wireless channels. In this letter, we investigate a MEC network with an eavesdropper, where the MEC server caches service programs required for task execution. Moreover, we propose a cooperative jamming-assisted scheme to enhance the security of computation offloading, in which a friendly jammer actively transmits signals to disrupt eavesdropping. Considering the limited caching capacity of the MEC server and the security concerns of computation offloading, we formulate a delay minimization problem by jointly optimizing service caching placement, transmit power, and devices' computation offloading decisions. To tackle this problem, we develop an efficient layered algorithm using successive convex approximation and the cross entropy-based technique. Numerical results demonstrate the effectiveness of our proposed scheme in reducing the overall delay in completing devices' computation tasks compared to baseline schemes.

Original languageEnglish
Pages (from-to)432-436
Number of pages5
JournalIEEE Communications Letters
Volume28
Issue number2
DOIs
Publication statusPublished - 2024 Feb 1

Bibliographical note

Publisher Copyright:
© 1997-2012 IEEE.

Keywords

  • Mobile edge computing
  • cooperative jamming
  • secure computation offloading
  • service caching

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Science Applications
  • Modelling and Simulation

Fingerprint

Dive into the research topics of 'Secure Computation Offloading and Service Caching in Mobile Edge Computing Networks'. Together they form a unique fingerprint.

Cite this