Skip to main content
Top

Security Aware Caching Placement Optimization Strategy in Cooperative Networks

  • 06-06-2020
Published in:

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Caching frequently requested contents at fog nodes has been proposed to alleviate the unprecedent pressure of limited backhaul capacity and decrease latency. However, due to the broadcast characteristic of wireless communication and limited resource, how to ensure information security is of vital importance. Compared with traditional encryption method, physical layer security has advantages on low computing complexity and resource consumption. In this paper, aiming at maximizing secrecy throughput, the Wynar’s encoding method is adopted to ensure communication security by jointly optimizing the caching placement strategy and secrecy rate. Numerical results have demonstrated that the proposed security aware caching placement strategy can outperform the other two baseline algorithms and achieve the tradeoff between diversity and security in cooperative networks.

Not a customer yet? Then find out more about our access models now:

Individual Access

Start your personal individual access now. Get instant access to more than 164,000 books and 540 journals – including PDF downloads and new releases.

Starting from 54,00 € per month!    

Get access

Access for Businesses

Utilise Springer Professional in your company and provide your employees with sound specialist knowledge. Request information about corporate access now.

Find out how Springer Professional can uplift your work!

Contact us now
Title
Security Aware Caching Placement Optimization Strategy in Cooperative Networks
Authors
Huiyun Xia
Xiaokang Zhou
Cheng Li
Publication date
06-06-2020
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 5/2020
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-020-01583-7
This content is only visible if you are logged in and have the appropriate permissions.