Physical layer security for NOMA-enabled multi-access edge computing wireless networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Multi-access edge computing (MEC) has been regarded as a promising technique for enhancing computation capabilities for wireless networks. In this paper, we study physical layer security in an MEC system where multiple users offload partial of their computation tasks to a base station simultaneously based on non-orthogonal multiple access (NOMA), in the presence of a malicious eavesdropper. Secrecy outage probability is adopted to measure the security performance of the computation offloading against eavesdropping attacks. We aim to minimize the sum energy consumption of all the users, subject to constraints in terms of the secrecy offloading rate, the secrecy outage probability, and the decoding order of NOMA. Although the original optimization problem is nonconvex and challenging to solve, we put forward an efficient algorithm based on sequential convex approximation and penalty dual decomposition. Numerical results are eventually provided to validate the convergence of the proposed algorithm and its superior energy efficiency with secrecy requirements.

Original languageEnglish
Title of host publication2021 IEEE/CIC International Conference on Communications in China, ICCC 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages41-46
Number of pages6
ISBN (Electronic)9781665443852
DOIs
StatePublished - 28 Jul 2021
Event2021 IEEE/CIC International Conference on Communications in China, ICCC 2021 - Xiamen, China
Duration: 28 Jul 202130 Jul 2021

Publication series

Name2021 IEEE/CIC International Conference on Communications in China, ICCC 2021

Conference

Conference2021 IEEE/CIC International Conference on Communications in China, ICCC 2021
Country/TerritoryChina
CityXiamen
Period28/07/2130/07/21

Fingerprint

Dive into the research topics of 'Physical layer security for NOMA-enabled multi-access edge computing wireless networks'. Together they form a unique fingerprint.

Cite this