Secrecy performance analysis and optimization for UAV-relay-enabled WPT and cooperative NOMA MEC in IoT networks

AN Nguyen, DB Ha, T Van Truong… - IEEE …, 2023 - ieeexplore.ieee.org
… and secrecy performance of a system for UAV-enabled wireless power transfer (WPT) and
NOMA MEC in the … RELATED WORKS In this paper, we consider a MEC network architecture …

Performance analysis of NOMA-based mobile edge computing with imperfect CSI

H Jiang, Y Wang, X Yue, X Li - EURASIP Journal on Wireless …, 2020 - Springer
… effect on performance under ipCSI condition in NOMA-MEC system… throughput and energy
efficiency of NOMA-MEC in delay-… and derived expressions of secrecy outage probability and …

Performance Analysis of MEC Based on NOMA under Imperfect CSI with Eavesdropper

X Li, Y Pei, H Jiang, X Yue, Y Wang… - … and Mobile Computing, 2021 - Wiley Online Library
… We concentrate on the secrecy performance of NOMA-MEC in the presence of an Eve. We
derive the exact expressions of SOP of NOMA-MEC under ipCSI/pCSI conditions. To obtain …

Joint Secrecy and Latency Performance Analysis for UAV-Assisted Uplink NOMA-Based IoT Network with Mobile Edge Computing

QH Nguyen-Anh, AN Nguyen, DB Ha - International Conference on …, 2024 - Springer
… We investigate a UAV-assisted NOMA-MEC with … of the secrecy offloading performance of
the system in practice. Accordingly, we propose an offloading protocol based on uplink NOMA

Performance Analysis of NOMA-Based MEC Systems With Semi-Grant-Free Transmission

B Chen, D Xu - IEEE Wireless Communications Letters, 2024 - ieeexplore.ieee.org
… Abstract—This letter investigates a non-orthogonal multiple access (NOMA) based … NOMA
and at the same time interfere with the eavesdropper to improve the GBU secrecy performance

Security enhancement with a hybrid cooperative NOMA scheme for MEC system

B Li, W Wu, W Zhao, H Zhang - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
… system achieves maximum energy efficiency by optimizing … and the secrecy outage probability,
and then minimizing secrecy … resource allocation in NOMA-MEC system without actively …

Secrecy Offloading Analysis of NOMA-based UAV-aided MEC in IoT Networks with Imperfect CSI and SIC

AN Nguyen, TS Ngo, NA Bui, PC Le… - EAI Endorsed …, 2024 - publications.eai.eu
… , we studied the secret offloading performance of NOMA based on UAV supported MEC in
IoT … (2023) Secrecy performance analysis and optimization for UAV-relay-enabled WPT and …

Secure and energy-efficient offloading and resource allocation in a NOMA-based MEC network

Q Wang, H Hu, RQ Hu - 2020 IEEE/ACM symposium on …, 2020 - ieeexplore.ieee.org
secrecy rate. Instead of only considering the power consumption or computing rate … on
NOMA-assisted MEC with external eavesdroppers typically focus on the performance evaluation

Energy-efficient resource allocation for secure NOMA-enabled mobile edge computing networks

W Wu, F Zhou, RQ Hu, B Wang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… prior works that studied NOMAassisted MEC via optimization … theoretic performance analysis
of the impact of both NOMAsecrecy performance of our considered NOMAassisted MEC

Resource allocation for enhancing offloading security in NOMA-enabled MEC networks

W Wu, X Wang, F Zhou, KK Wong, C Li… - IEEE Systems …, 2020 - ieeexplore.ieee.org
… AEA) for uplink NOMA users subject to the worst-case secrecy rate requirements and limited
… an efficient iterative algorithm by jointly designing the secrecy rate, local computing bits, and …