
Research Article
Integrated Sensing and Communication Empowered Secure Computation Offloading in Integrated Satellite-Terrestrial Networks
@INPROCEEDINGS{10.1007/978-3-031-86196-3_22, author={Chenglong Dou and Xumin Huang and Jiawen Kang and Yuan Wu and Liping Qian}, title={Integrated Sensing and Communication Empowered Secure Computation Offloading in Integrated Satellite-Terrestrial Networks}, proceedings={Wireless and Satellite Systems. 14th EAI International Conference, WiSATS 2024, Harbin, China, August 23--25, 2024, Proceedings, Part I}, proceedings_a={WISATS}, year={2025}, month={3}, keywords={Integrate satellite-terrestrial networks Edge computing Integrated sensing and communication Physical layer security}, doi={10.1007/978-3-031-86196-3_22} }
- Chenglong Dou
Xumin Huang
Jiawen Kang
Yuan Wu
Liping Qian
Year: 2025
Integrated Sensing and Communication Empowered Secure Computation Offloading in Integrated Satellite-Terrestrial Networks
WISATS
Springer
DOI: 10.1007/978-3-031-86196-3_22
Abstract
Integrated satellite-terrestrial edge computing networks have emerged as a promising solution to enhance data processing capabilities and connectivity in remote and underserved areas. However, the physical layer security of computation offloading in such networks is increasingly challenged by potential eavesdroppers. In this paper, we propose an integrated sensing and communication (ISAC) empowered secure computation offloading in integrated satellite-terrestrial networks, in which the satellite can utilize the ISAC signal to sense the malicious eavesdropper with an uncertain location while offloading data with improved secrecy rates. To investigate this problem, we formulate a joint optimization of the transmit beamforming, the receive beamforming, the computation offloading strategies and the associated allocations of the communication and computing resources, with the objective of maximizing the minimum sensing performance for all possible eavesdropper locations, while guaranteeing the secrecy offloading transmission rate. Despite the nonconvexity of the formulated problem, we propose an efficient algorithm to obtain its solutions. Numerical results validate the performance advantages of our ISAC empowered secure computation offloading in secrecy and robustness.