Mobility-aware computational offloading in mobile edge networks: a survey

SK Zaman, AI Jehangiri, T Maqsood, Z Ahmad… - Cluster …, 2021 - Springer
Technological evolution of mobile devices, such as smart phones, laptops, wearable and
other handheld devices have come up with the emergence of different user applications in …

Energy-efficient resource allocation for secure NOMA-enabled mobile edge computing networks

W Wu, F Zhou, RQ Hu, B Wang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Mobile edge computing (MEC) has been envisaged as a promising technique in the next-
generation wireless networks. In order to improve the security of computation tasks …

Resource allocation for enhancing offloading security in NOMA-enabled MEC networks

W Wu, X Wang, F Zhou, KK Wong, C Li… - IEEE Systems …, 2020 - ieeexplore.ieee.org
This paper studies an uplink nonorthogonal multiple access (NOMA)-enabled mobile-edge
computing network. Specifically, we focus on the practical design of secure offloading …

Security enhancement with a hybrid cooperative NOMA scheme for MEC system

B Li, W Wu, W Zhao, H Zhang - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
This article investigates how to exploit the cooperative mechanism between non-orthogonal
multiple access (NOMA) user pairs to enhance the security of the mobile-edge computing …

Energy-efficient secure NOMA-enabled mobile edge computing networks

W Wu, F Zhou, P Li, P Deng, B Wang… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
This paper considers a non-orthogonal multiple access (NOMA) assisted mobile edge
computing (MEC) system in the presence of a malicious eavesdropper. We employ the …

[PDF][PDF] 基于非正交多址接入的移动边缘计算安全节能联合资源分配

郝万明, 孙继威, 孙钢灿, 朱政宇, 周一青 - 电子与信息学报, 2021 - jeit.ac.cn
为提高基于非正交多址接入(NOMA) 的移动边缘计算(MEC) 系统中计算任务部分卸载时的安全
性, 该文在存在窃听者情况下研究MEC 网络的物理层安全, 采用保密中断概率来衡量计算卸载的 …

Test and analysis of window vibration for anti-laser-eavesdropping

Y Zeng, P Pan, Y Cao, H Ai - Applied acoustics, 2021 - Elsevier
Windows are obvious targets for laser eavesdropping and can be easily eavesdropped.
However, studies on the window vibration characteristics and associated anti-laser …

An energy-saving joint resource allocation approach for mobile edge computing based on NOMA

M Yu, M Zhang - Physical Communication, 2024 - Elsevier
Mobile edge computing can use the wireless access network to provide the services
required by telecom users and cloud computing functions nearby, thereby creating a service …

Secure transmission schemes for two-way relay networks

M Luo, X Li, J Wang, Q Yin, W Tang, S Li - IEEE Access, 2019 - ieeexplore.ieee.org
We investigate the physical-layer security problems of two-way relay networks in this paper.
The whole network consists of two legitimate users and one eavesdropper, where the legal …

Cooperative secure transmission against collusive eavesdroppers in Internet of Things

X Fan, Y Huo - International Journal of Distributed Sensor …, 2020 - journals.sagepub.com
As Internet of Things (IoT) has boomed in recent years, many security issues have also been
exposed. Focusing on physical layer security in wireless Internet of Things network …