Dynamic and Distributed Probing for Covert Cognitive Mobile Edge Computing Networks

IF 10.7 1区 计算机科学 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC IEEE Transactions on Wireless Communications Pub Date : 2025-01-03 DOI:10.1109/TWC.2024.3521303
Xiaofan Liu;Haitham H. Esmat;Beatriz Lorenzo;Dennis Goeckel
{"title":"Dynamic and Distributed Probing for Covert Cognitive Mobile Edge Computing Networks","authors":"Xiaofan Liu;Haitham H. Esmat;Beatriz Lorenzo;Dennis Goeckel","doi":"10.1109/TWC.2024.3521303","DOIUrl":null,"url":null,"abstract":"Ensuring covert and secure communication remains a challenge in the evolving landscape of wireless communications. This paper presents a covert cognitive mobile edge computing network (CCMEC) in which secondary nodes (Alice) aim to transmit securely and offload computing tasks to secondary edge computing nodes (Bob) in the presence of multiple primary wardens (Willie). A two-stage connectivity probing and activation scheme is developed to maximize the data transmitted under covertness and minimize the energy consumption within a latency bound. The proposed scheme combines a distributed probing phase to find secure available connections based on the activity of primary and secondary nodes and a centralized activation phase to jointly optimize power allocation, channel, and Bob selection. The problem is solved by a Restless Multi-Armed Bandit (RMAB) framework with Whittle index optimization. Simulation results show the effectiveness of our approach in achieving covert communication compared to existing solutions.","PeriodicalId":13431,"journal":{"name":"IEEE Transactions on Wireless Communications","volume":"24 3","pages":"2435-2450"},"PeriodicalIF":10.7000,"publicationDate":"2025-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Wireless Communications","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10824687/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Ensuring covert and secure communication remains a challenge in the evolving landscape of wireless communications. This paper presents a covert cognitive mobile edge computing network (CCMEC) in which secondary nodes (Alice) aim to transmit securely and offload computing tasks to secondary edge computing nodes (Bob) in the presence of multiple primary wardens (Willie). A two-stage connectivity probing and activation scheme is developed to maximize the data transmitted under covertness and minimize the energy consumption within a latency bound. The proposed scheme combines a distributed probing phase to find secure available connections based on the activity of primary and secondary nodes and a centralized activation phase to jointly optimize power allocation, channel, and Bob selection. The problem is solved by a Restless Multi-Armed Bandit (RMAB) framework with Whittle index optimization. Simulation results show the effectiveness of our approach in achieving covert communication compared to existing solutions.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
隐蔽认知移动边缘计算网络的动态和分布式探测
在不断发展的无线通信领域,确保隐蔽和安全通信仍然是一个挑战。本文提出了一种隐蔽的认知移动边缘计算网络(CCMEC),其中辅助节点(Alice)旨在在多个主监护人(Willie)存在的情况下安全地传输和卸载计算任务到辅助边缘计算节点(Bob)。提出了一种两阶段的连接探测和激活方案,以最大限度地提高在隐蔽条件下传输的数据量,并在一定的延迟范围内最小化能量消耗。该方案结合了分布式探测阶段和集中式激活阶段,分布式探测阶段根据主节点和从节点的活动情况寻找安全可用连接,集中式激活阶段共同优化功率分配、信道和Bob选择。采用一种带Whittle指数优化的不动多臂强盗(RMAB)框架来解决该问题。仿真结果表明,与现有解决方案相比,我们的方法在实现隐蔽通信方面是有效的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
18.60
自引率
10.60%
发文量
708
审稿时长
5.6 months
期刊介绍: The IEEE Transactions on Wireless Communications is a prestigious publication that showcases cutting-edge advancements in wireless communications. It welcomes both theoretical and practical contributions in various areas. The scope of the Transactions encompasses a wide range of topics, including modulation and coding, detection and estimation, propagation and channel characterization, and diversity techniques. The journal also emphasizes the physical and link layer communication aspects of network architectures and protocols. The journal is open to papers on specific topics or non-traditional topics related to specific application areas. This includes simulation tools and methodologies, orthogonal frequency division multiplexing, MIMO systems, and wireless over optical technologies. Overall, the IEEE Transactions on Wireless Communications serves as a platform for high-quality manuscripts that push the boundaries of wireless communications and contribute to advancements in the field.
期刊最新文献
Breaking the Diagonal Mold: Full-Scattering Matrix Control in BD-RIS for Securing Satellite RSMA Multi-IRS-Aided ISAC System: Multi-Path Exploitation Versus Reduction PP-MoE: A Physics-Prioritized Mixture of Experts Scheme for Adaptive Channel Estimation STAR-RIS-Assisted Heterogeneous Cooperative ISAC Mechanism in the Finite Blocklength Regime Heterogeneous VLC-RF-Enabled Vehicular Fog Computing for Delay Optimization: Joint Task Offloading and Resource Allocation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1