Secure Data Processing Technology of Distribution Network OPGW Line with Edge Computing
Keywords:Secrecy outage probability, OPGW communication, edge computing
Promoted by information technology and scalable information systems, the network design and communication method of optical fiber composite overhead ground wire (OPGW) have been in great progress recently. As the overhead transmission line has strict requirements on the outer diameter and weight of OPGW, it is of vital importance to perform the physical-layer secure data processing for the distribution network OPGW line with edge computing. To this end, we examine a physical-layer secure distribution network OPGW with edge computing in this article, where there exists one transmitter S, one receiver D, one authorized legitimate monitor LM, and an interfering node I. To better analyze the system performance, we firstly give the definition of the system outage probability, based on the secure data rate. Then, we evaluate the system performance for the distribution network OPGW, by deriving analytical outage probability of secure data processing, to facilitate the system performance evaluation of secure data processing in the entire SNR regime. Finally, we demonstrate some simulation results to validate the analytical results on the physical-layer secure distribution network OPGW line with edge computing.
Z. Na, C. Ji, B. Lin, and N. Zhang, “Joint optimization of trajectory and resource allocation in secure uav relaying communications for internet of things,” IEEE Internet of Things Journal, 2022.
Y. Wu and C. Gao, “Intelligent resource allocation scheme for cloud-edge-end framework aided multi-source data stream,” to appear in EURASIP J. Adv. Signal Process., vol. 2023, no. 1, 2023.
R. Zhao and M. Tang, “Profit maximization in cache-aided intelligent computing networks,” Physical Commu-nication, vol. PP, no. 99, pp. 1–10, 2022.
N. Dahlin and R. Jain, “Scheduling flexible nonpreemp-tive loads in smart-grid networks,” IEEE Trans. Control. Netw. Syst., vol. 9, no. 1, pp. 14–24, 2022.
E. Z. Serper and A. Altin-Kayhan, “Coverage and connectivity based lifetime maximization with topology update for WSN in smart grid applications,” Comput. Networks, vol. 209, p. 108940, 2022.
Z. Alavikia and M. Shabro, “A comprehensive layered approach for implementing internet of things-enabled smart grid: A survey,” Digit. Commun. Networks, vol. 8, no. 3, pp. 388–410, 2022.
S. Mishra, “Blockchain-based security in smart grid network,” Int. J. Commun. Networks Distributed Syst., vol. 28, no. 4, pp. 365–388, 2022.
X. Lai, “Outdated access point selection for mobile edge computing with cochannel interference,” IEEE Trans. Vehic. Tech., vol. 71, no. 7, pp. 7445–7455, 2022.
J. Ling and C. Gao, “Dqn based resource allocation for NOMA-MEC aided multi-source data stream,” to appear in EURASIP J. Adv. Signal Process., vol. 2023, no. 1, 2023.
S. Tang, “Dilated convolution based CSI feedback compression for massive MIMO systems,” IEEE Trans. Vehic. Tech., vol. 71, no. 5, pp. 211–216, 2022.
S. Tang and L. Chen, “Computational intelligence and deep learning for next-generation edge-enabled industrial IoT,” IEEE Trans. Netw. Sci. Eng., vol. 9, no. 3, pp. 105–117, 2022.
L. Chen, “Physical-layer security on mobile edge computing for emerging cyber physical systems,” Computer Communications, vol. 194, no. 1, pp. 180–188, 2022.
L. He and X. Tang, “Learning-based MIMO detection with dynamic spatial modulation,” IEEE Transactions on Cognitive Communications and Networking, vol. PP, no. 99, pp. 1–12, 2023.
B. Li, Z. Na, and B. Lin, “Uav trajectory planning from a comprehensive energy efficiency perspective in harsh environments,” IEEE Network, vol. 36, no. 4, pp. 62–68, 2022.
X. Zheng and C. Gao, “Intelligent computing for WPT-MEC aided multi-source data stream,” to appear in EURASIP J. Adv. Signal Process., vol. 2023, no. 1, 2023.
W. Wu, F. Zhou, R. Q. Hu, and B. Wang, “Energy-efficient resource allocation for secure noma-enabled mobile edge computing networks,” IEEE Trans. Commun., vol. 68, no. 1, pp. 493–505, 2020.
L. Zhang and C. Gao, “Deep reinforcement learning based IRS-assisted mobile edge computing under physical-layer security,” Physical Communication, vol. 55,
p. 101896, 2022.
Y. Guo and W. Xu, “Resource allocation in wireless power transfer assisted federated learning networks,” IEEE Transactions on Communications, vol. PP, no. 99, pp. 1–12, 2023.
L. Chen and X. Lei, “Relay-assisted federated edge learn-ing:Performance analysis and system optimization,” IEEE Transactions on Communications, vol. PP, no. 99, pp. 1–12, 2022.
W. Zhou and X. Lei, “Priority-aware resource scheduling for uav-mounted mobile edge computing networks,” IEEE Trans. Vehic. Tech., vol. PP, no. 99, pp. 1–6, 2023.
J. Lu and M. Tang, “Performance analysis for IRS-assisted MEC networks with unit selection,” Physical Communication, vol. 55, p. 101869, 2022.
W. Zhou and F. Zhou, “Profit maximization for cache-enabled vehicular mobile edge computing networks,” IEEE Trans. Vehic. Tech., vol. PP, no. 99, pp. 1–6, 2023.
Y. Wu and C. Gao, “Task offloading for vehicular edge computing with imperfect CSI: A deep reinforcement approach,” Physical Communication, vol. 55, p. 101867, 2022.
S. Tang and X. Lei, “Collaborative cache-aided relaying networks: Performance evaluation and system optimiza-tion,” IEEE Journal on Selected Areas in Communications, vol. PP, no. 99, pp. 1–12, 2022.
R. Zhao, C. Fan, J. Ou, D. Fan, J. Ou, and M. Tang, “Impact of direct links on intelligent reflect surface-aided mec networks,” Physical Communication, vol. 55,
p. 101905, 2022.
W. Wu, F. Zhou, B. Wang, Q. Wu, C. Dong, and R. Q. Hu, “Unmanned aerial vehicle swarm-enabled edge computing: Potentials, promising technologies, and challenges,” IEEE Wirel. Commun., vol. 29, no. 4, pp. 78–85, 2022.
How to Cite
Copyright (c) 2022 Ying Zeng, Zhongmiao Kang, Zhan Shi
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.