Secrecy of Edge Caching

Abstract

Wireless networks are naturally vulnerable to a variety of security threats. The common thread is to complement developments in any aspect of wireless technologies with security-preserving mechanisms. To this end, we study in this chapter various types of confidentiality concerns and adversarial attacks in caching networks. The underlying model assumptions and network topology are decidedly chosen to abstract the security concern in interest in its most basic formulation. The defining problem, in most of the considered settings, is to study the fundamental trade-off between the cache-memory sizes in the network and the delivery load such that the user requests and the desired security requirements are satisfied. Characterizing such trade-offs is approached by constructing achievability algorithms and deriving impossibility bounds. A particular emphasis is given to a setting in which a powerful strategic adversary optimizes its tapping capability over the two phases of communication in a cache-aided system, i.e., cache placement and delivery.

Department(s)

Electrical and Computer Engineering

International Standard Book Number (ISBN)

978-183953122-4;978-183953123-1

Document Type

Article - Journal

Document Version

Citation

File Type

text

Language(s)

English

Rights

© 2024 Institute of Electrical and Electronics Engineers, All rights reserved.

Publication Date

01 Jan 2022

This document is currently not available here.

Share

 
COinS