Sustainable delay minimization strategy for mobile edge computing offloading under different network scenarios

A Andrawes, R Nordin, Z Albataineh, MH Alsharif - Sustainability, 2021 - mdpi.com
… time needed to locate and restore faults, thus making the 5G distribution network unreliable.
… in NOMA-MEC networks. The authors in [28] proposed a hybrid NOMA-MEC system, but this …

A systematic review on NOMA variants for 5G and beyond

I Budhiraja, N Kumar, S Tyagi, S Tanwar, Z Han… - IEEE …, 2021 - ieeexplore.ieee.org
… proposed a NOMA relay network, where a dedicated relay was … relay network to maximize
the throughput of the cooperative … user from untrusted users during the NOMA transmission pro…

Device-enhanced MEC: Multi-access edge computing (MEC) aided by end device computation and caching: A survey

M Mehrabi, D You, V Latzko, H Salah… - IEEE …, 2019 - ieeexplore.ieee.org
… an MEC server as ad-hoc relay nodes in order to provide a connection between the failed
MEC server and a new MEC … ularly helpful for network systems with unreliable caching nodes. …

Secrecy outage performance analysis for uplink CR-NOMA systems with hybrid SIC

H Lei, F Yang, IS Ansari, H Liu, KJ Kim… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
… In [12], secure uplink NOMAenabled mobile edge computing (NOMA-MEC) … were untrusted
by each other was investigated in [19]. The near user worked as an amplify-and-forward relay

Intelligent ubiquitous computing for future UAV-enabled MEC network systems

L Chen, R Zhao, K He, Z Zhao, L Fan - Cluster Computing, 2022 - Springer
… Now, we can show the framework to optimize the MEC network. Especially, we use a linear
combination of the latency and energy consumption to formulate the total system cost, which …

Secrecy energy efficiency maximization in D2D-enabled MEC networks: a GNN-based approach

J Hu, Z Zhang, Y Ge, J Mao, Z Chu… - … Engineering, Big Data …, 2024 - spiedigitallibrary.org
… and MEC, D2D-enabled MEC networks that integrate D2D communication into MEC networks
have … During the transmission, DRs that are not trusted by the offloading user in the same …

Secrecy performance for full-duplex jamming-aided uplink noma system

K Jiang, H Wang - IEEE Transactions on Vehicular Technology, 2021 - ieeexplore.ieee.org
… of fullduplex relay (FDR) networks, in which the relay node trans… the secrecy performance
of the untrusted relay system with a … communication during a MEC computational offloading …

Energy-efficient computation offloading for secure UAV-edge-computing systems

T Bai, J Wang, Y Ren, L Hanzo - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… -orthogonalmultiple-access (NOMA) into multi-user MEC offloading for improving the … MEC,
mainly from three perspectives [13]: trust and authentication mechanisms, secure networking, …

[HTML][HTML] Beyond encryption: Exploring the potential of physical layer security in UAV networks

F Xu, S Ahmad, M Ahmed, S Raza, F Khan, Y Ma… - Journal of King Saud …, 2023 - Elsevier
… enabling UAV communication, which include NOMA, 3D beamforming, and mmWave, …
relays to assist current communications networks. In contrast to a typically fixed relay, UAV relays

A novel secure relay selection strategy for energy-harvesting-enabled Internet of things

Y Huo, M Xu, X Fan, T Jing - … on Wireless Communications and Networking, 2018 - Springer
… In this section, we propose a relay selection strategy when an SU is trusted or untrusted.
Then, the charging and discharging process of an SU’s battery is modeled as a finite state …