Energy-Efficient Resource Allocation for Secure NOMA-Enabled Mobile Edge Computing Networks

Mobile edge computing (MEC) has been envisaged as a promising technique in the next-generation wireless networks. In order to improve the security of computation tasks offloading and enhance user connectivity, physical layer security and non-orthogonal multiple access (NOMA) are studied in MEC-aware networks. The secrecy outage probability is adopted to measure the secrecy performance of computation offloading by considering a practically passive eavesdropping scenario. The weighted sum-energy consumption minimization problem is firstly investigated subject to the secrecy offloading rate constraints, the computation latency constraints and the secrecy outage probability constraints. The semi-closed form expression for the optimal solution is derived. We then investigate the secrecy outage probability minimization problem by taking the priority of two users into account, and characterize the optimal secrecy offloading rates and power allocations with closed-form expressions. Numerical results demonstrate that the performance of our proposed design are better than those of the alternative benchmark schemes.

[1]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[2]  Shuguang Cui,et al.  Joint offloading and computing optimization in wireless powered mobile-edge computing systems , 2017, 2017 IEEE International Conference on Communications (ICC).

[3]  Haibin Zhang,et al.  Connecting Intelligent Things in Smart Hospitals Using NB-IoT , 2018, IEEE Internet of Things Journal.

[4]  Octavia A. Dobre,et al.  Resource Allocation for Downlink NOMA Systems: Key Techniques and Open Issues , 2017, IEEE Wireless Communications.

[5]  George K. Karagiannidis,et al.  A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends , 2017, IEEE Journal on Selected Areas in Communications.

[6]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[7]  Tong-Xing Zheng,et al.  Improving Anti-Eavesdropping Ability Without Eavesdropper’s CSI: A Practical Secure Transmission Design Perspective , 2018, IEEE Wireless Communications Letters.

[8]  Rose Qingyang Hu,et al.  Computation Rate Maximization in UAV-Enabled Wireless-Powered Mobile-Edge Computing Systems , 2018, IEEE Journal on Selected Areas in Communications.

[9]  Ming Zeng,et al.  Energy-efficient Resource Allocation for NOMA-assisted Mobile Edge Computing , 2018, 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC).

[10]  Jie Xu,et al.  Exploiting Physical-Layer Security for Multiuser Multicarrier Computation Offloading , 2018, IEEE Wireless Communications Letters.

[11]  Tao Zhang,et al.  Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.

[12]  Yuan Wu,et al.  Delay-Minimization Nonorthogonal Multiple Access Enabled Multi-User Mobile Edge Computation Offloading , 2019, IEEE Journal of Selected Topics in Signal Processing.

[13]  H. Vincent Poor,et al.  Joint Power and Time Allocation for NOMA–MEC Offloading , 2018, IEEE Transactions on Vehicular Technology.

[14]  Fuhui Zhou,et al.  Robust AN-Aided Beamforming and Power Splitting Design for Secure MISO Cognitive Radio With SWIPT , 2016, IEEE Transactions on Wireless Communications.

[15]  Jiajia Liu,et al.  Coordinated Multipoint-Based Uplink Transmission in Internet of Things Powered by Energy Harvesting , 2018, IEEE Internet of Things Journal.

[16]  Feng Wang,et al.  Optimized Multiuser Computation Offloading with Multi-Antenna NOMA , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).

[17]  Zdenek Becvar,et al.  Mobile Edge Computing: A Survey on Architecture and Computation Offloading , 2017, IEEE Communications Surveys & Tutorials.

[18]  Rui Zhang,et al.  Cellular-Connected UAV: Potential, Challenges, and Promising Technologies , 2018, IEEE Wireless Communications.

[19]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[20]  Ying Jun Zhang,et al.  Computation Rate Maximization for Wireless Powered Mobile-Edge Computing With Binary Computation Offloading , 2017, IEEE Transactions on Wireless Communications.

[21]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[22]  Bruno Clerckx,et al.  Communications and Signals Design for Wireless Power Transmission , 2016, IEEE Transactions on Communications.

[23]  Derrick Wing Kwan Ng,et al.  Robust and Secure Resource Allocation for Full-Duplex MISO Multicarrier NOMA Systems , 2017, IEEE Transactions on Communications.

[24]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[25]  Shuangfeng Han,et al.  Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends , 2015, IEEE Communications Magazine.

[26]  Vincent K. N. Lau,et al.  On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.

[27]  H. Vincent Poor,et al.  Securing Downlink Massive MIMO-NOMA Networks With Artificial Noise , 2019, IEEE Journal of Selected Topics in Signal Processing.

[28]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[29]  Shuguang Cui,et al.  Joint Computation and Communication Cooperation for Energy-Efficient Mobile Edge Computing , 2018, IEEE Internet of Things Journal.

[30]  Victor C. M. Leung,et al.  Energy-Efficient Secure NOMA-Enabled Mobile Edge Computing Networks , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[31]  Zhiguo Ding,et al.  Multi-Antenna NOMA for Computation Offloading in Multiuser Mobile Edge Computing Systems , 2017, IEEE Transactions on Communications.

[32]  H. Vincent Poor,et al.  Impact of Non-Orthogonal Multiple Access on the Offloading of Mobile Edge Computing , 2018, IEEE Transactions on Communications.

[33]  Baoyun Wang,et al.  Robust Secure Beamforming for Wireless Powered Full-Duplex Systems With Self-Energy Recycling , 2017, IEEE Transactions on Vehicular Technology.

[34]  Nirwan Ansari,et al.  Edge Computing Aware NOMA for 5G Networks , 2017, IEEE Internet of Things Journal.