Non-orthogonal multiple access assisted secure computation offloading via cooperative jamming

Y Wu, G Ji, T Wang, L Qian, B Lin… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we investigate non-orthogonal multiple access (NOMA) assisted secure
computation offloading under the eavesdropping-attack, in which a malicious node …

Secrecy-based energy-efficient mobile edge computing via cooperative non-orthogonal multiple access transmission

L Qian, W Wu, W Lu, Y Wu, B Lin… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Mobile edge computing (MEC) has been envisioned as a promising approach for enabling
the computation-intensive yet latency-sensitive mobile Internet services in future wireless …

Security enhancement with a hybrid cooperative NOMA scheme for MEC system

B Li, W Wu, W Zhao, H Zhang - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
This article investigates how to exploit the cooperative mechanism between non-orthogonal
multiple access (NOMA) user pairs to enhance the security of the mobile-edge computing …

Energy efficient secure computation offloading in NOMA-based mMTC networks for IoT

S Han, X Xu, S Fang, Y Sun, Y Cao… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
In the era of Internet of Everything, massive connectivity and various demands of latency for
Internet of Things (IoT) devices will be supported by the massive machine type …

Energy-efficient resource allocation for secure NOMA-enabled mobile edge computing networks

W Wu, F Zhou, RQ Hu, B Wang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Mobile edge computing (MEC) has been envisaged as a promising technique in the next-
generation wireless networks. In order to improve the security of computation tasks …

Resource allocation for enhancing offloading security in NOMA-enabled MEC networks

W Wu, X Wang, F Zhou, KK Wong, C Li… - IEEE Systems …, 2020 - ieeexplore.ieee.org
This paper studies an uplink nonorthogonal multiple access (NOMA)-enabled mobile-edge
computing network. Specifically, we focus on the practical design of secure offloading …

Secure NOMA-based UAV-MEC network towards a flying eavesdropper

W Lu, Y Ding, Y Gao, Y Chen, N Zhao… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) allows multiple users to share link resource for
higher spectrum efficiency. It can be applied to unmanned aerial vehicle (UAV) and mobile …

Exploiting physical-layer security for multiuser multicarrier computation offloading

J Xu, J Yao - IEEE wireless communications letters, 2018 - ieeexplore.ieee.org
This letter considers a mobile edge computing system with one access point (AP) serving
multiple users over a multicarrier channel, in the presence of a malicious eavesdropper. In …

Secure computation efficiency maximization in NOMA-enabled mobile edge computing networks

H Lin, Y Cao, Y Zhong, P Liu - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, a computation efficiency maximization problem is studied in a multi-user non-
orthogonal multiple access (NOMA) enabled mobile edge computing (MEC) networks …

Reinforcement learning based latency minimization in secure NOMA-MEC systems with hybrid SIC

K Wang, H Li, Z Ding, P Xiao - IEEE transactions on wireless …, 2022 - ieeexplore.ieee.org
In this paper, physical layer security (PLS) in a non-orthogonal multiple access (NOMA)-
based mobile edge computing (MEC) system is investigated, where hybrid successive …