Performance Analysis of a Cache-Aided Wireless Heterogeneous Network With Secrecy Constraints

In this paper, we analyze the impact of caching on the performance of a cache enabled system with heterogeneous traffic where one of the users need to be served with confidential data. In this setup, a wireless helper system always serves a dedicated user and it can also serve a user requesting cach...

Full description

Bibliographic Details
Main Authors: Georgios Smpokos, Zheng Chen, Parthajit Mohapatra, Nikolaos Pappas
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9389783/
_version_ 1818360602682195968
author Georgios Smpokos
Zheng Chen
Parthajit Mohapatra
Nikolaos Pappas
author_facet Georgios Smpokos
Zheng Chen
Parthajit Mohapatra
Nikolaos Pappas
author_sort Georgios Smpokos
collection DOAJ
description In this paper, we analyze the impact of caching on the performance of a cache enabled system with heterogeneous traffic where one of the users need to be served with confidential data. In this setup, a wireless helper system always serves a dedicated user and it can also serve a user requesting cached content. A cellular network access point is also available to serve the latter user if it cannot retrieve the requested data from the helper’s cache. The impact of caching and secrecy on throughput and delay performance for each user is then examined when the access point can deploy superposition coding to serve both users simultaneously. Two decoding schemes are considered in this work. The first decoding scheme treats interference from parallel transmissions as noise while the second one utilizes the parallel transmission to apply successive decoding for the intended data. Furthermore, network and cache related factors are identified and their impact on the overall performance of the system are analyzed. In order to find the optimal transmission power allocations, two distinct optimization problems are set in this context comparing the two decoding schemes. This will assist to identify the benefits of the considered decoding schemes for each user satisfying the secrecy requirements of the dedicated user and reducing its impact on the overall performance of the system.
first_indexed 2024-12-13T21:03:24Z
format Article
id doaj.art-15c61f14b14c438597d7e73abdec7fe4
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-13T21:03:24Z
publishDate 2021-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-15c61f14b14c438597d7e73abdec7fe42022-12-21T23:31:33ZengIEEEIEEE Access2169-35362021-01-019524425245410.1109/ACCESS.2021.30697369389783Performance Analysis of a Cache-Aided Wireless Heterogeneous Network With Secrecy ConstraintsGeorgios Smpokos0https://orcid.org/0000-0002-3282-697XZheng Chen1https://orcid.org/0000-0001-5621-2860Parthajit Mohapatra2Nikolaos Pappas3https://orcid.org/0000-0003-4416-7702Department of Group Network Engineering and Delivery, Vodafone, Athens, GreeceDepartment of Electrical Engineering, Linköping University, Linköping, SwedenDepartment of Electrical Engineering, IIT Tirupati, Tirupati, IndiaDepartment of Science and Technology, Linköping University, Norrköping, SwedenIn this paper, we analyze the impact of caching on the performance of a cache enabled system with heterogeneous traffic where one of the users need to be served with confidential data. In this setup, a wireless helper system always serves a dedicated user and it can also serve a user requesting cached content. A cellular network access point is also available to serve the latter user if it cannot retrieve the requested data from the helper’s cache. The impact of caching and secrecy on throughput and delay performance for each user is then examined when the access point can deploy superposition coding to serve both users simultaneously. Two decoding schemes are considered in this work. The first decoding scheme treats interference from parallel transmissions as noise while the second one utilizes the parallel transmission to apply successive decoding for the intended data. Furthermore, network and cache related factors are identified and their impact on the overall performance of the system are analyzed. In order to find the optimal transmission power allocations, two distinct optimization problems are set in this context comparing the two decoding schemes. This will assist to identify the benefits of the considered decoding schemes for each user satisfying the secrecy requirements of the dedicated user and reducing its impact on the overall performance of the system.https://ieeexplore.ieee.org/document/9389783/Cachingdelay analyissecrecysuperposition coding
spellingShingle Georgios Smpokos
Zheng Chen
Parthajit Mohapatra
Nikolaos Pappas
Performance Analysis of a Cache-Aided Wireless Heterogeneous Network With Secrecy Constraints
IEEE Access
Caching
delay analyis
secrecy
superposition coding
title Performance Analysis of a Cache-Aided Wireless Heterogeneous Network With Secrecy Constraints
title_full Performance Analysis of a Cache-Aided Wireless Heterogeneous Network With Secrecy Constraints
title_fullStr Performance Analysis of a Cache-Aided Wireless Heterogeneous Network With Secrecy Constraints
title_full_unstemmed Performance Analysis of a Cache-Aided Wireless Heterogeneous Network With Secrecy Constraints
title_short Performance Analysis of a Cache-Aided Wireless Heterogeneous Network With Secrecy Constraints
title_sort performance analysis of a cache aided wireless heterogeneous network with secrecy constraints
topic Caching
delay analyis
secrecy
superposition coding
url https://ieeexplore.ieee.org/document/9389783/
work_keys_str_mv AT georgiossmpokos performanceanalysisofacacheaidedwirelessheterogeneousnetworkwithsecrecyconstraints
AT zhengchen performanceanalysisofacacheaidedwirelessheterogeneousnetworkwithsecrecyconstraints
AT parthajitmohapatra performanceanalysisofacacheaidedwirelessheterogeneousnetworkwithsecrecyconstraints
AT nikolaospappas performanceanalysisofacacheaidedwirelessheterogeneousnetworkwithsecrecyconstraints