scholarly journals On secure computation over the binary modulo-2 adder multiple-access wiretap channel

Author(s):  
Mario Goldenbaum ◽  
Holger Boche ◽  
H. Vincent Poor
IEEE Access ◽  
2017 ◽  
Vol 5 ◽  
pp. 7244-7253 ◽  
Author(s):  
Kaiwei Jiang ◽  
Tao Jing ◽  
Fan Zhang ◽  
Yan Huo ◽  
Zhen Li

Energies ◽  
2020 ◽  
Vol 13 (21) ◽  
pp. 5540 ◽  
Author(s):  
Carla E. Garcia ◽  
Mario R. Camana ◽  
Insoo Koo

In this paper, we aim to provide reliable user connectivity and enhanced security for computation task offloading. Physical layer security is studied in a wireless-powered non-orthogonal multiple access (NOMA) mobile edge computing (MEC) system with a nonlinear energy-harvesting (EH) user and a power beacon (PB) in the presence of an eavesdropper. To further provide a friendly environment resource allocation design, wireless power transfer (WPT) is applied. The secure computation efficiency (SCE) problem is solved by jointly optimizing the transmission power, the time allocations for energy transfer, the computation time, and the central processing unit (CPU) frequency in the NOMA-enabled MEC system. The problem is non-convex and challenging to solve because of the complexity of the objective function in meeting constraints that ensure the required quality of service, such as the minimum value of computed bits, limitations on total energy consumed by users, maximum CPU frequency, and minimum harvested energy and computation offloading times. Therefore, in this paper, a low-complexity particle swarm optimization (PSO)-based algorithm is proposed to solve this optimization problem. For comparison purposes, time division multiple access and fully offloading baseline schemes are investigated. Finally, simulation results demonstrate the superiority of the proposed approach over baseline schemes.


Entropy ◽  
2019 ◽  
Vol 21 (10) ◽  
pp. 945
Author(s):  
Karim Banawan ◽  
Sennur Ulukus

We investigate the secure degrees of freedom (s.d.o.f.) of three new channel models: broadcast channel with combating helpers, interference channel with selfish users, and multiple access wiretap channel with deviating users. The goal of introducing these channel models is to investigate various malicious interactions that arise in networks, including active adversaries. That is in contrast with the common assumption in the literature that the users follow a certain protocol altruistically and transmit both message-carrying and cooperative jamming signals in an optimum manner. In the first model, over a classical broadcast channel with confidential messages (BCCM), there are two helpers, each associated with one of the receivers. In the second model, over a classical interference channel with confidential messages (ICCM), there is a helper and users are selfish. By casting each problem as an extensive-form game and applying recursive real interference alignment, we show that, for the first model, the combating intentions of the helpers are neutralized and the full s.d.o.f. is retained; for the second model, selfishness precludes secure communication and no s.d.o.f. is achieved. In the third model, we consider the multiple access wiretap channel (MAC-WTC), where multiple legitimate users wish to have secure communication with a legitimate receiver in the presence of an eavesdropper. We consider the case when a subset of users deviate from the optimum protocol that attains the exact s.d.o.f. of this channel. We consider two kinds of deviation: when some of the users stop transmitting cooperative jamming signals, and when a user starts sending intentional jamming signals. For the first scenario, we investigate possible responses of the remaining users to counteract such deviation. For the second scenario, we use an extensive-form game formulation for the interactions of the deviating and well-behaving users. We prove that a deviating user can drive the s.d.o.f. to zero; however, the remaining users can exploit its intentional jamming signals as cooperative jamming signals against the eavesdropper and achieve an optimum s.d.o.f.


2018 ◽  
Vol 12 (8) ◽  
pp. 962-969 ◽  
Author(s):  
Sahar Shahbaz ◽  
Bahareh Akhbari ◽  
Reza Asvadi

Sign in / Sign up

Export Citation Format

Share Document