Han Zhang , Jianbin Xue , Xiangrui Guan , Zerou Ma , Jialing Xu
{"title":"An optimization scheme of data link security transmission based on mobile edge computing","authors":"Han Zhang , Jianbin Xue , Xiangrui Guan , Zerou Ma , Jialing Xu","doi":"10.1016/j.adhoc.2024.103556","DOIUrl":null,"url":null,"abstract":"<div><p>For the past few years, the security of data transmission links has been increasingly valued. However, with the increasing requirements for the security performance of data transmission links, how to cut the cost of upgrading while improving security has become a serious challenge. In response to the issue of ensuring low-cost and secure data transmission in wireless communication environments with eavesdroppers, this article innovatively starts with idle roadside units and studies how to incentivize roadside units to transmit interference power to interfere with eavesdroppers, thereby efficiently and economically improving the security performance of mobile user data transmission. Firstly, the impact of roadside unit transmission interference power on the security performance of data transmission links was analyzed by establishing a theoretical model; Then, this paper proposes a three-layer model consisting of ground user groups, eavesdropping users, roadside units, and UAVs equipped with mobile edge computing servers. In this model, by encouraging idle roadside units to send interference power, ground users are assisted to safely unload their own data to mobile edge computing servers. Meanwhile, considering the selfishness of idle roadside units, an improved algorithm based on simulated annealing algorithm is proposed to achieve the optimal mapping between ground users and idle roadside units. Finally, through the analysis of simulation results, this scheme can achieve the goal of reducing system costs while improving the security of data transmission.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4000,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ad Hoc Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1570870524001677","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
For the past few years, the security of data transmission links has been increasingly valued. However, with the increasing requirements for the security performance of data transmission links, how to cut the cost of upgrading while improving security has become a serious challenge. In response to the issue of ensuring low-cost and secure data transmission in wireless communication environments with eavesdroppers, this article innovatively starts with idle roadside units and studies how to incentivize roadside units to transmit interference power to interfere with eavesdroppers, thereby efficiently and economically improving the security performance of mobile user data transmission. Firstly, the impact of roadside unit transmission interference power on the security performance of data transmission links was analyzed by establishing a theoretical model; Then, this paper proposes a three-layer model consisting of ground user groups, eavesdropping users, roadside units, and UAVs equipped with mobile edge computing servers. In this model, by encouraging idle roadside units to send interference power, ground users are assisted to safely unload their own data to mobile edge computing servers. Meanwhile, considering the selfishness of idle roadside units, an improved algorithm based on simulated annealing algorithm is proposed to achieve the optimal mapping between ground users and idle roadside units. Finally, through the analysis of simulation results, this scheme can achieve the goal of reducing system costs while improving the security of data transmission.
期刊介绍:
The Ad Hoc Networks is an international and archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in ad hoc and sensor networking areas. The Ad Hoc Networks considers original, high quality and unpublished contributions addressing all aspects of ad hoc and sensor networks. Specific areas of interest include, but are not limited to:
Mobile and Wireless Ad Hoc Networks
Sensor Networks
Wireless Local and Personal Area Networks
Home Networks
Ad Hoc Networks of Autonomous Intelligent Systems
Novel Architectures for Ad Hoc and Sensor Networks
Self-organizing Network Architectures and Protocols
Transport Layer Protocols
Routing protocols (unicast, multicast, geocast, etc.)
Media Access Control Techniques
Error Control Schemes
Power-Aware, Low-Power and Energy-Efficient Designs
Synchronization and Scheduling Issues
Mobility Management
Mobility-Tolerant Communication Protocols
Location Tracking and Location-based Services
Resource and Information Management
Security and Fault-Tolerance Issues
Hardware and Software Platforms, Systems, and Testbeds
Experimental and Prototype Results
Quality-of-Service Issues
Cross-Layer Interactions
Scalability Issues
Performance Analysis and Simulation of Protocols.