2022
DOI: 10.1109/access.2022.3220264
|View full text |Cite
|
Sign up to set email alerts
|

Design and Optimization of a UAV-Enabled Non-Orthogonal Multiple Access Edge Computing IoT System

Abstract: Unmanned aerial vehicle (UAV)-enabled mobile edge computing (MEC) in IoT systems has recently gained prominence as a solution to accommodate the low latency and high energy efficiency needs of emerging and developing 5G-and-beyond IoT applications. Given the limited spectrum available, non-orthogonal multiple access (NOMA) communication scheme provides a spectral-and power-efficient task offloading means. In this work, a novel framework is proposed for a multiple-UAV-enabled MEC IoT system incorporating uplink… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 39 publications
0
1
0
Order By: Relevance
“…In Fig. 4, we compare our proposed system with a system using orthogonal multiple access (OMA) [66] based on the SCP and SOP values of the UWNMI network obtained in simulation runs performed with varying UAV transmit power to test SNR conditions ranging from 0 to 100 dB. The first observation is that the Monte Carlo simulation results show a strong match with our analysis, confirming the accuracy of our proposed model.…”
Section: Table 2: Simulation Parameterssupporting
confidence: 67%
“…In Fig. 4, we compare our proposed system with a system using orthogonal multiple access (OMA) [66] based on the SCP and SOP values of the UWNMI network obtained in simulation runs performed with varying UAV transmit power to test SNR conditions ranging from 0 to 100 dB. The first observation is that the Monte Carlo simulation results show a strong match with our analysis, confirming the accuracy of our proposed model.…”
Section: Table 2: Simulation Parameterssupporting
confidence: 67%
“…IoT has an extensive variety of applications including smart houses, asset tracking, healthcare monitoring, environmental monitoring, and industrial automation. On the other hand, IoT networks rely on wireless transmission technologies like cellular networks, WiFi, Bluetooth, ZigBee, and OWC technologies [143].…”
Section: Opportunities and Applications Of Sduav Networkmentioning
confidence: 99%
“…Traditional physical layer security technologies focus on improving the confidentiality of received information [9,10], for example, by changing the coding method, using redundant information in the coding to check and interfere, or changing the amplitude and phase of the transmission signal to carry additional information [11][12][13]. Physical layer security technology can improve the security transmission rate of information through pre-designed policies.…”
Section: Introductionmentioning
confidence: 99%