IEEE Access (Jan 2020)

Optimal Access Scheme for Security Provisioning of C-V2X Computation Offloading Network With Imperfect CSI

  • Bin Qiu,
  • Hailin Xiao,
  • Anthony Theodore Chronopoulos,
  • Di Zhou,
  • Shan Ouyang

DOI
https://doi.org/10.1109/ACCESS.2020.2964795
Journal volume & issue
Vol. 8
pp. 9680 – 9691

Abstract

Read online

In a cellular vehicle-to-everything (C-V2X) enabled computation-offloading network, vehicular users may deliver computation tasks to a cellular base station (BS) through vehicle-to-infrastructure (V2I) transmission links in order to accommodate computation-intensive applications, where the BS is usually equipped with a mobile edge computing (MEC) server. However, due to the broadcast nature of wireless communications and high-mobility of vehicles, the computation-offloading information may suffer from an eavesdropping threat. In practice, the interference generated by device-to-device-based V2V (D2D-V) links can be utilized for protecting the offloading information against eavesdropping. This observation motivates a security provisioning for C-V2X computation-offloading network. Specifically, a dynamic threshold-based access scheme is required to maintain the interference under control for different channel conditions. Unfortunately, the previous studies that are based on the assumption of perfect channel state information (CSI) can not be applied for the dynamic vehicular networks. In this paper, we propose a dynamic threshold-based access scheme for security provisioning of C-V2X computation-offloading network by considering an imperfect CSI. In this scheme, an optimized access threshold is set to update adaptively in terms of channel estimation error for balancing both the security and reliability of the offloading link. Furthermore, the proposed scheme can maximize the secrecy throughput under a connection outage constraint of the D2D-V links, with the total area spectral efficiency optimized under the security performance criterion for the offloading link. Numerical results are provided for validating the proposed theoretical analysis. A useful design insight is provided for attaining an optimal configuration of C-V2X computation-offloading network.

Keywords