Security Aware Caching Placement Optimization Strategy in Cooperative Networks

  • PDF / 723,978 Bytes
  • 7 Pages / 595.224 x 790.955 pts Page_size
  • 68 Downloads / 239 Views

DOWNLOAD

REPORT


Security Aware Caching Placement Optimization Strategy in Cooperative Networks Huiyun Xia1 · Xiaokang Zhou1 · Cheng Li2

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Caching frequently requested contents at fog nodes has been proposed to alleviate the unprecedent pressure of limited backhaul capacity and decrease latency. However, due to the broadcast characteristic of wireless communication and limited resource, how to ensure information security is of vital importance. Compared with traditional encryption method, physical layer security has advantages on low computing complexity and resource consumption. In this paper, aiming at maximizing secrecy throughput, the Wynar’s encoding method is adopted to ensure communication security by jointly optimizing the caching placement strategy and secrecy rate. Numerical results have demonstrated that the proposed security aware caching placement strategy can outperform the other two baseline algorithms and achieve the tradeoff between diversity and security in cooperative networks. Keywords Physical layer security · Probabilistic caching · Secrecy rate · Cooperative networks · Average secrecy throughput

1 Introduction The explosively increasing traffic data as well as diverse demands of universal mobile users, resulting from the rapid development of 5G communication technologies, has brought unprecedented pressure to the backhaul links with limited capacity. The table in [1] has demonstrated the enhancement of the next-generation capabilities from IMT2020 compared with IMT-Advanced. To alleviate such bottleneck, fog computing emerged as an efficient way to compensate for “the last mile”. Caching at the fog node as a solution has received more and more attention,  Huiyun Xia

[email protected] Xiaokang Zhou [email protected] Cheng Li [email protected] 1

School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, 150001, People’s Republic of China

2

Electrical and Computer Engineering Faculty of Engineering and Applied Science, Memorial University, 230 Elizabeth Ave, St. John’s, NL A1C 5S7, Canada

since it can not only reduce the pressure of backhaul links and probability of network congestion, but also decrease the network latency. However, due to the limitation of resource, caching at fog nodes also faces the challenge of being eavesdropped by illegitimate users due to its broadcast nature. Therefore, how to ensure communication confidentiality is of vital importance. Traditional encryption method sacrifices some resources to accomplish secret key management and secret key distribution and requires high computing complexity, which is not affordable for fog nodes with limited resources and computing capability. With respect to this, physical layer security has its advantage by means of channel coding and exploiting the inherent characteristics of wireless media, such as random noise and fluctuate channels. Recently, physical layer security aided caching schemes have obtained some achievements. Considerin