TY - GEN
T1 - Physical layer security for NOMA-enabled multi-access edge computing wireless networks
AU - Wen, Yating
AU - Zheng, Tong Xing
AU - Tong, Yongxia
AU - Liu, Hao Wen
AU - Chen, Xin
AU - Mu, Pengcheng
AU - Wang, Hui Ming
N1 - Publisher Copyright:
© 2021 IEEE.
PY - 2021/7/28
Y1 - 2021/7/28
N2 - Multi-access edge computing (MEC) has been regarded as a promising technique for enhancing computation capabilities for wireless networks. In this paper, we study physical layer security in an MEC system where multiple users offload partial of their computation tasks to a base station simultaneously based on non-orthogonal multiple access (NOMA), in the presence of a malicious eavesdropper. Secrecy outage probability is adopted to measure the security performance of the computation offloading against eavesdropping attacks. We aim to minimize the sum energy consumption of all the users, subject to constraints in terms of the secrecy offloading rate, the secrecy outage probability, and the decoding order of NOMA. Although the original optimization problem is nonconvex and challenging to solve, we put forward an efficient algorithm based on sequential convex approximation and penalty dual decomposition. Numerical results are eventually provided to validate the convergence of the proposed algorithm and its superior energy efficiency with secrecy requirements.
AB - Multi-access edge computing (MEC) has been regarded as a promising technique for enhancing computation capabilities for wireless networks. In this paper, we study physical layer security in an MEC system where multiple users offload partial of their computation tasks to a base station simultaneously based on non-orthogonal multiple access (NOMA), in the presence of a malicious eavesdropper. Secrecy outage probability is adopted to measure the security performance of the computation offloading against eavesdropping attacks. We aim to minimize the sum energy consumption of all the users, subject to constraints in terms of the secrecy offloading rate, the secrecy outage probability, and the decoding order of NOMA. Although the original optimization problem is nonconvex and challenging to solve, we put forward an efficient algorithm based on sequential convex approximation and penalty dual decomposition. Numerical results are eventually provided to validate the convergence of the proposed algorithm and its superior energy efficiency with secrecy requirements.
UR - https://www.scopus.com/pages/publications/85119341017
U2 - 10.1109/ICCC52777.2021.9580336
DO - 10.1109/ICCC52777.2021.9580336
M3 - 会议稿件
AN - SCOPUS:85119341017
T3 - 2021 IEEE/CIC International Conference on Communications in China, ICCC 2021
SP - 41
EP - 46
BT - 2021 IEEE/CIC International Conference on Communications in China, ICCC 2021
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2021 IEEE/CIC International Conference on Communications in China, ICCC 2021
Y2 - 28 July 2021 through 30 July 2021
ER -