Posted Date : 07th Mar, 2025
Peer-Reviewed Journals List: A Guide to Quality Research Publications ...
Posted Date : 07th Mar, 2025
Choosing the right journal is crucial for successful publication. Cons...
Posted Date : 27th Feb, 2025
Why Peer-Reviewed Journals Matter Quality Control: The peer revie...
Posted Date : 27th Feb, 2025
The Peer Review Process The peer review process typically follows sev...
Posted Date : 27th Feb, 2025
What Are Peer-Reviewed Journals? A peer-reviewed journal is a publica...
Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers
Author Name : S. Roshini, C. Bhanu Prakash Reddy
ABSTRACT Mobile Edge Computing (MEC) has emerged as a critical enabler of low-latency services for mobile users by offloading computational tasks to edge servers. However, with the growing deployment of MEC, the security of transmitted data has become a paramount concern, particularly in environments with multiple eavesdroppers. This paper addresses the security challenges of MEC networks by analyzing the impact of multiple eavesdroppers on the secrecy rate of data transmission. We propose a secure resource allocation strategy that optimizes both computation offloading and transmission power in the presence of eavesdroppers, ensuring confidentiality without compromising efficiency. The proposed method is evaluated through simulations, demonstrating improved security performance compared to traditional approaches. Our findings emphasize the importance of adaptive security measures in MEC to safeguard sensitive data in hostile environments.