2020
DOI: 10.1109/access.2020.3015786
|View full text |Cite
|
Sign up to set email alerts
|

Security Energy Efficiency Maximization for Untrusted Relay Assisted NOMA-MEC Network With WPT

Abstract: Relay assisted transmission can effectively improve the range of coverage and offloading efficiency of non-orthogonal multiple access-mobile edge computing (NOMA-MEC) system. However, the relay will become untrusted relay when it is attacked by malicious users, resulting in the leakage of information. To solve this problem, this paper uses destination-assisted jamming to prevent the leakage of information during the offloading process. Under the condition of time delay and energy consumption, we jointly optimi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 40 publications
0
1
0
Order By: Relevance
“…Huang et al [20] proposed a distributed computation offloading algorithm considering both the energy consumption and delays. Moreover, Zhao et al [21] added the energy consumption constraints to the optimization objectives for relay-assisted Non-Orthogonal Multiple Access (NOMA)-MEC network with WPT. However, the preceding work frequently ignores the top limit of the energy consumption of the equipment in the actual scenario.…”
Section: Related Workmentioning
confidence: 99%
“…Huang et al [20] proposed a distributed computation offloading algorithm considering both the energy consumption and delays. Moreover, Zhao et al [21] added the energy consumption constraints to the optimization objectives for relay-assisted Non-Orthogonal Multiple Access (NOMA)-MEC network with WPT. However, the preceding work frequently ignores the top limit of the energy consumption of the equipment in the actual scenario.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, the related secrecy capacity enhancement techniques in the physical layer security can be applied, such as improving the main channel through relays; or deteriorating the eavesdropper's channel through artificial noise; or enhancing the main capacity through nonorthogonal multiple access technology. [21] studies the use of relay to improve the offloading rate. Since the relay is untrustworthy, the MEC server needs to interfere with it accordingly.…”
Section: Introductionmentioning
confidence: 99%