2021
DOI: 10.1109/jsyst.2020.3009723
|View full text |Cite
|
Sign up to set email alerts
|

Resource Allocation for Enhancing Offloading Security in NOMA-Enabled MEC Networks

Abstract: This letter studies an uplink non-orthogonal multiple access (NOMA) enabled mobile-edge computing (MEC) network. Specifically, we focus on the practical design of secure offloading without knowing the eavesdropper's channel state information. The aim is to maximize the minimum antieavesdropping ability (AEA) for uplink NOMA users subject to the worst-case secrecy rate requirements and limited transmission power budgets. The formulated problem is non-convex and difficult to be solved directly. In order to tackl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(24 citation statements)
references
References 11 publications
0
19
0
Order By: Relevance
“…ree classical resource allocation and task for service m ∈ service cache order co m , do (10) if rs ≥ m , then (11) amn � 1 (12) rs � rs − m (13) end if (14) end for (15) scheduling algorithms in recent years are selected for comparison, which are MEC-based resource management and task scheduling (MEC-RMTS) [28], coalitional gamebased cooperative offloading (CGCO) [29], and multiservice task computing offload algorithm (MTCOA) [30]. e MEC-RMTS framework is used for efficient task offloading in the internet of things, CGCO is a cooperative offloading algorithm based on the coalitional game, and MTCOA solves the multiservice task offloading problem.…”
Section: Results Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…ree classical resource allocation and task for service m ∈ service cache order co m , do (10) if rs ≥ m , then (11) amn � 1 (12) rs � rs − m (13) end if (14) end for (15) scheduling algorithms in recent years are selected for comparison, which are MEC-based resource management and task scheduling (MEC-RMTS) [28], coalitional gamebased cooperative offloading (CGCO) [29], and multiservice task computing offload algorithm (MTCOA) [30]. e MEC-RMTS framework is used for efficient task offloading in the internet of things, CGCO is a cooperative offloading algorithm based on the coalitional game, and MTCOA solves the multiservice task offloading problem.…”
Section: Results Analysismentioning
confidence: 99%
“…In addition, a secure mechanism was proposed to lower the economic returns. ere were most important two aspects in MEC, which were the security of task offloading and the connectivity of users, and in [15], the constraint of offloading rate and latency was studied to express the optimal solution of MEC.…”
Section: Related Workmentioning
confidence: 99%
“…Studies on NOMA-MEC: A proper joint management of NOMA and MEC has been explored to improve the performance of computation and communication. There have been many studies on investigating the integration of MEC and NOMA [13]- [16]. For example, Qian et al [13] proposed an optimal algorithm for the NOMA-MEC-assisted IoT network to obtain the optimal SIC ordering and computation resource allocation by the convex computation resource allocation optimization followed by the combinatorial SIC ordering optimization.…”
Section: Related Workmentioning
confidence: 99%
“…Li et al [15] investigated how to exploit the cooperative mechanism between NOMA user pairs to enhance the security of the NOMA-MEC system. Wu et al [16] maximized the minimum anti-eavesdropping ability for uplink NOMA users in the context of the worstcase secrecy rate requirements and limited transmit power budgets for the uplink NOMA-MEC network. Fang et al [17] proposed a low complexity algorithm to minimize the total energy consumption by the task assignment, power allocation and user association for the multi-user NOMA-MEC network.…”
Section: Related Workmentioning
confidence: 99%
“…Wireless Communications and Mobile Computing researched the security behaviors of NOMA for MECaware networks, considered passive eavesdropping schemes, measured the security performance of computing offload by using security interruption probability, and deduced the semiclosed form expression of the optimal solution. In order to further evaluate the eavesdropping ability of users without knowing the CSI of the Eve, the authors in [23] proposed an effective iterative algorithm to maximize the minimum antieavesdropping ability of uplink NOMA users by jointly formulating the security rate, locally calculating bits, and allocating power. To solve the delay problem of NOMA in the presence of malicious Eves, an algorithm based on binary search was proposed, which can ensure the security rate and make the maximum task delay of uplink NOMA users minimal [24].…”
Section: Introductionmentioning
confidence: 99%