Secrecy of Edge Caching
Abstract
Wireless networks are naturally vulnerable to a variety of security threats. The common thread is to complement developments in any aspect of wireless technologies with security-preserving mechanisms. To this end, we study in this chapter various types of confidentiality concerns and adversarial attacks in caching networks. The underlying model assumptions and network topology are decidedly chosen to abstract the security concern in interest in its most basic formulation. The defining problem, in most of the considered settings, is to study the fundamental trade-off between the cache-memory sizes in the network and the delivery load such that the user requests and the desired security requirements are satisfied. Characterizing such trade-offs is approached by constructing achievability algorithms and deriving impossibility bounds. A particular emphasis is given to a setting in which a powerful strategic adversary optimizes its tapping capability over the two phases of communication in a cache-aided system, i.e., cache placement and delivery.
Recommended Citation
M. Nafea and A. Yener, "Secrecy of Edge Caching," Edge Caching for Mobile Networks, pp. 189 - 219, Institute of Electrical and Electronics Engineers, Jan 2022.
Department(s)
Electrical and Computer Engineering
International Standard Book Number (ISBN)
978-183953122-4;978-183953123-1
Document Type
Article - Journal
Document Version
Citation
File Type
text
Language(s)
English
Rights
© 2024 Institute of Electrical and Electronics Engineers, All rights reserved.
Publication Date
01 Jan 2022