Secrecy-based energy-efficient mobile edge computing via cooperative non-orthogonal multiple access transmission

L Qian, W Wu, W Lu, Y Wu, B Lin… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Mobile edge computing (MEC) has been envisioned as a promising approach for enabling
the computation-intensive yet latency-sensitive mobile Internet services in future wireless …

Non-orthogonal multiple access assisted secure computation offloading via cooperative jamming

Y Wu, G Ji, T Wang, L Qian, B Lin… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we investigate non-orthogonal multiple access (NOMA) assisted secure
computation offloading under the eavesdropping-attack, in which a malicious node …

Energy-efficient resource allocation for secure NOMA-enabled mobile edge computing networks

W Wu, F Zhou, RQ Hu, B Wang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Mobile edge computing (MEC) has been envisaged as a promising technique in the next-
generation wireless networks. In order to improve the security of computation tasks …

Secure computation efficiency maximization in NOMA-enabled mobile edge computing networks

H Lin, Y Cao, Y Zhong, P Liu - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, a computation efficiency maximization problem is studied in a multi-user non-
orthogonal multiple access (NOMA) enabled mobile edge computing (MEC) networks …

Energy-efficient multi-access mobile edge computing with secrecy provisioning

LP Qian, Y Wu, N Yu, D Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Thanks to the wide deployment of heterogeneous radio access networks (RANs) in the past
decades, the emerging paradigm of multi-access mobile edge computing, which allows …

Delay aware secure offloading for NOMA-assisted mobile edge computing in internet of vehicles

L He, M Wen, Y Chen, M Yan… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, a multi-vehicle multi-task non-orthogonal multiple access (NOMA) assisted
mobile edge computing (MEC) system with passive eavesdropping vehicles is investigated …

Secrecy offloading rate maximization for multi-access mobile edge computing networks

M Zhao, H Bao, L Yin, J Yao… - IEEE Communications …, 2021 - ieeexplore.ieee.org
This letter considers a multi-access mobile edge computing (MEC) network consisting of
multiple users, multiple base stations, and a malicious eavesdropper. Specifically, the users …

Energy efficient secure computation offloading in NOMA-based mMTC networks for IoT

S Han, X Xu, S Fang, Y Sun, Y Cao… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
In the era of Internet of Everything, massive connectivity and various demands of latency for
Internet of Things (IoT) devices will be supported by the massive machine type …

Security enhancement with a hybrid cooperative NOMA scheme for MEC system

B Li, W Wu, W Zhao, H Zhang - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
This article investigates how to exploit the cooperative mechanism between non-orthogonal
multiple access (NOMA) user pairs to enhance the security of the mobile-edge computing …

Offloading optimization for low-latency secure mobile edge computing systems

Y Zhou, PL Yeoh, C Pan, K Wang… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
This letter proposes a low-latency secure mobile edge computing (MEC) system where
multiple users offload computing tasks to a base station in the presence of an eavesdropper …