Optimization of energy consumption with hybrid cooperative NOMA for secure MEC

X Fu, X Yu, S Wang - 2022 4th International Academic …, 2022 - ieeexplore.ieee.org
The widespread use of non-orthogonal multiple access (NOMA) has changed the traditional
physical layer security limits on per-user transmission rates, with the attendant increase in …

Energy-efficient resource allocation for secure NOMA-enabled mobile edge computing networks

W Wu, F Zhou, RQ Hu, B Wang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Mobile edge computing (MEC) has been envisaged as a promising technique in the next-
generation wireless networks. In order to improve the security of computation tasks …

Security enhancement with a hybrid cooperative NOMA scheme for MEC system

B Li, W Wu, W Zhao, H Zhang - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
This article investigates how to exploit the cooperative mechanism between non-orthogonal
multiple access (NOMA) user pairs to enhance the security of the mobile-edge computing …

Security energy efficiency maximization for untrusted relay assisted NOMA-MEC network with WPT

P Zhao, W Zhao, H Bao, B Li - IEEE Access, 2020 - ieeexplore.ieee.org
Relay assisted transmission can effectively improve the range of coverage and offloading
efficiency of non-orthogonal multiple access-mobile edge computing (NOMA-MEC) system …

Reinforcement learning based latency minimization in secure NOMA-MEC systems with hybrid SIC

K Wang, H Li, Z Ding, P Xiao - IEEE Transactions on Wireless …, 2022 - ieeexplore.ieee.org
In this paper, physical layer security (PLS) in a non-orthogonal multiple access (NOMA)-
based mobile edge computing (MEC) system is investigated, where hybrid successive …

An energy-saving joint resource allocation approach for mobile edge computing based on NOMA

M Yu, M Zhang - Physical Communication, 2024 - Elsevier
Mobile edge computing can use the wireless access network to provide the services
required by telecom users and cloud computing functions nearby, thereby creating a service …

Secure computation efficiency maximization in NOMA-enabled mobile edge computing networks

H Lin, Y Cao, Y Zhong, P Liu - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, a computation efficiency maximization problem is studied in a multi-user non-
orthogonal multiple access (NOMA) enabled mobile edge computing (MEC) networks …

Energy-Efficient Secure Offloading for NOMA-Enabled Machine-type Mobile-Edge Computing

Y Zhou, H Sun, X Ma, RQ Hu - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Mobile edge computing (MEC) has emerged as a crucial paradigm for enhancing the
capabilities in machine-type communication, which relies on sufficient spectrum resources to …

A novel secrecy offloading in NOMA heterogeneous mobile edge computing network

VT Truong, DB Ha - … Conference on Advanced Engineering Theory and …, 2022 - Springer
In this study, we investigate the security offloading scenario in the NOMA heterogeneous
mobile edge computing (Het-MEC) network over the Rayleigh fading channel. Specifically …

Energy-efficient secure NOMA-enabled mobile edge computing networks

W Wu, F Zhou, P Li, P Deng, B Wang… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
This paper considers a non-orthogonal multiple access (NOMA) assisted mobile edge
computing (MEC) system in the presence of a malicious eavesdropper. We employ the …