Security energy efficiency maximization for untrusted relay assisted NOMA-MEC network with WPT

P Zhao, W Zhao, H Bao, B Li - IEEE Access, 2020 - ieeexplore.ieee.org
… of untrusted relay assisted MEC to offload by NOMA transmission has … of untrusted relay
assisted MEC to offload by NOMA … : • In the relay-assisted MEC system, NOMA transmission is …

The research of NOMA-MEC network based on untrusted relay-assisted transmission in power internet of things

D Li, B Li, N Qin, X Jing, C Du… - IOP Conference Series …, 2021 - iopscience.iop.org
… In this paper, The system model is a three-node model including relay, collector and
MEC server. The collector offload the data to the MEC through direct transmission and relay-…

Secrecy performance analysis and optimization for UAV-relay-enabled WPT and cooperative NOMA MEC in IoT networks

AN Nguyen, DB Ha, T Van Truong… - IEEE …, 2023 - ieeexplore.ieee.org
… RELATED WORKS In this paper, we consider a MEC network … a NOMA-based MEC system
in an IoT network consisting of a UAV U deployed as a decode-and-forward (DF) relay [9] …

Secure transmission in NOMA-enabled Industrial IoT with resource-constrained untrusted devices

S Thapar, D Mishra, R Saini - IEEE Transactions on Industrial …, 2023 - ieeexplore.ieee.org
… the strong device against the untrusted weak device for a friendly jammer relay scenario. In
… 1) We focus on achieving a secure NOMA-enabled IIoT network in the presence of untrusted

Secure Offloading in NOMA-Enabled Multi-Access Edge Computing Networks

TX Zheng, X Chen, Y Wen, N Zhang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
… 1, we consider an uplink NOMAMEC network consisting of a BS (integrated with an … allocation
for mobile edge computing with multiple relays,” IEEE Internet Things J., vol. 9, no. 13, pp. …

Secrecy-based energy-efficient mobile edge computing via cooperative non-orthogonal multiple access transmission

L Qian, W Wu, W Lu, Y Wu, B Lin… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… energy-efficient MEC via cooperative NOMA transmissions of the … in NOMA-based Internet
of Things networks, in which a relay … scenario via a untrusted relay and exploited NOMA with a …

Energy‐Efficient Computational Offloading for Secure NOMA‐Enabled Mobile Edge Computing Networks

H Wang - Wireless Communications and Mobile Computing, 2022 - Wiley Online Library
… use of relay to improve the offloading rate. Since the relay is untrustworthy, the MEC server
… In this work, we investigated a secure uplink NOMA-enabled MEC network under the threat …

Performance analysis and optimization for IoT mobile edge computing networks with RF energy harvesting and UAV relaying

AN Nguyen, DB Ha, VT Truong, DT Do, C So-In - IEEE Access, 2022 - ieeexplore.ieee.org
… , MEC systems incorporating both UR and NOMA techniques have not been studied extensively
in recent works. Thus, in this paper, we investigate a UR NOMA-based MEC system in …

A novel secure protocol for mobile edge computing network applied downlink NOMA

DB Ha, VT Truong, DH Ha - Industrial Networks and Intelligent Systems …, 2020 - Springer
untrusted) MEC access points (APs) through downlink NOMA… APS-NOMA MEC scheme for
a secure NOMA MEC network. We … amplify-and-forward relaying networks. In: 5th NAFOSTED …

Interplay between NOMA and other emerging technologies: A survey

M Vaezi, GAA Baduge, Y Liu, A Arafa… - … and Networking, 2019 - ieeexplore.ieee.org
… -based transmission models with trusted and untrusted cooperative relays are studied … be
offloaded to the MEC server for remote computation, a hybrid NOMAMEC system is proposed …