Optimal Access Scheme for Security Provisioning of C-V2X Computation Offloading Network With Imperfect CSI.
Bin QiuHailin XiaoAnthony Theodore ChronopoulosDi ZhouShan OuyangPublished in: IEEE Access (2020)
Keyphrases
- network access
- access control
- wireless local area network
- cloud computing
- access points
- security threats
- ns simulator
- security measures
- network management
- remote server
- security issues
- digital signature scheme
- differentiated services
- network traffic
- network security
- service provisioning
- network structure
- sys tems
- enterprise network
- key distribution
- buffer overflow
- virtual private network
- optimal solution
- security policies
- computer networks
- information security
- wireless networks
- intrusion detection
- bandwidth allocation
- allocation scheme
- cyber attacks
- communication networks
- access requests
- peer to peer