Skip to main content

A Novel Secure Protocol for Mobile Edge Computing Network Applied Downlink NOMA

  • Conference paper
  • First Online:
Industrial Networks and Intelligent Systems (INISCOM 2020)

Abstract

In this paper, we study a mobile edge computing (MEC) network based on non-orthogonal multiple access (NOMA) scheme, in which a user can offload its tasks to two MEC servers through downlink NOMA. Due to security constraint, the confidential tasks must be computed on the trusted server, the remain tasks can be offloaded to other server if needed. In this scenario, we propose a novel secure protocol, namely APS-NOMA MEC, based on access point selection (APS) scheme to guarantee the security constraint. The exact closed-form expression of successful computation probability for this proposed system protocol is derived. We further study the impact of the network parameters on the system performance to confirm the effectiveness of deployment of NOMA in MEC network. The numerical results show that our proposed protocol outperforms the conventional NOMA MEC scheme in terms of computation efficiency. Finally, the simulation results are also provided to verify the accuracy of our analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mao, Y., You, C., Zhang, J., Huang, K., Letaief, K.B.: A survey on mobile edge computing: the communication perspective. IEEE Commun. Surv. Tutorials 19(4), 2322–2358 (2017)

    Article  Google Scholar 

  2. Zhou, F., Wu, Y., Hu, R.Q., Qian, Y.: Computation rate maximization in uav-enabled wireless powered mobile-edge computing systems. IEEE J. Sel. Areas Commun. 36(9), 1927–1941 (2018)

    Article  Google Scholar 

  3. Sun, H., Zhou, F., Hu, R.Q.: Joint offloading and computation energy efficiency maximization in a mobile edge computing system. IEEE Trans. Veh. Technol. 68(3), 3052–3056 (2019)

    Google Scholar 

  4. Zhang, Y., Lan, X., Li, Y., Cai, L., Pan, J.: Efficient computation resource management in mobile edge-cloud computing. IEEE Internet of Things J. 6(2), 3455–3466 (2019)

    Article  Google Scholar 

  5. Li, Q., Zhao, J., Gong, Y.: Computation offloading and resource allocation for mobile edge computing with multiple access points. IET Commun. 13(17), 2668–2677 (2019)

    Article  Google Scholar 

  6. Lu, W., Yin, B., Huang, G., Li, B.: Edge caching strategy design and reward contract optimization for uav-enabled mobile edge networks (2020). EURASIP J. Wireless Commun. Networking 38, 1–10 (2020). https://doi.org/10.1186/s13638-020-1655-2

    Article  Google Scholar 

  7. Men, J., Ge, J.: Performance analysic of non-orthogonal multiple access in downlink cooperative network. IET Commun. 9(18), 2267–2273 (2015)

    Article  Google Scholar 

  8. Islam, S.M.R., Avazov, N., Dobre, O.A., Kwak, K.S.: Power-domain non-orthogonal multiple access (NOMA) in 5G systems: potentials and challenges. IEEE Commun. Surv. Tutorials 19(2), 721–742 (2017)

    Article  Google Scholar 

  9. Ha, D.-B., Nguyen, S.Q.: Outage performance of energy harvesting DF relaying NOMA networks. Mob. Netw. Appl. 23(6), 1572–1585 (2017). https://doi.org/10.1007/s11036-017-0922-x

    Article  Google Scholar 

  10. Tran, D.D., Tran, H.V., Ha, D.B., Kaddoum, G.: Cooperation in NOMA networks under limited user-to-user communications: Solution and analysis. In: IEEE Wireless Communications and Networking Conference (WCNC), 15–18 April 2018, Barcelona, Spain (2018)

    Google Scholar 

  11. Tran, D.D., Ha, D.B.: Secrecy performance analysis of QoS-based non-orthogonal multiple access networks over nakagami-m fading. In: The International Conference on Recent Advances in Signal Processing, Telecommunications and Computing (SigTelCom), HCMC, Vietnam (2018)

    Google Scholar 

  12. Ye, Y., Lu, G., Hu, R.Q., Shi, L.: On the performance and optimization for MEC networks using uplink noma. In IEEE International Conference on Communications Workshops (ICC Workshops), Shanghai, China. IEEE (2019)

    Google Scholar 

  13. Zhou, F., Wu, Y., Hu, R.Q., Qian, Y.: Computation efficiency in a wireless-powered mobile edge computing network with NOMA. In: IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019 (2019)

    Google Scholar 

  14. Wang, F., Xu, J., Ding, Z.: Multi-antenna noma for computation offloading in multiuser mobile edge computing systems. IEEE Trans. Commun. 67(3), 2450–2463 (2019)

    Article  Google Scholar 

  15. Ding, Z., Fan, P., Poor, H.V.: Impact of non-orthogonal multiple access on the offloading of mobile edge computing. IEEE Trans. Commun. 67(1), 375–390 (2019)

    Article  Google Scholar 

  16. Ha, D.H., Ha, D.B., Zdralek, J., Voznak, M.: A new protocol based on optimal capacity for energy harvesting amplify-and-forward relaying networks. In: 5th NAFOSTED Conference on Information and Computer Science (NICS) (HCMC, Vietnam) (2018)

    Google Scholar 

  17. Gradshteyn, I., Ryzhik, I.: Table of Integrals Series and Products. Elsevier Academic Press, Brulington (2007)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dac-Binh Ha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ha, DB., Truong, VT., Ha, DH. (2020). A Novel Secure Protocol for Mobile Edge Computing Network Applied Downlink NOMA. In: Vo, NS., Hoang, VP. (eds) Industrial Networks and Intelligent Systems. INISCOM 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 334. Springer, Cham. https://doi.org/10.1007/978-3-030-63083-6_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-63083-6_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-63082-9

  • Online ISBN: 978-3-030-63083-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics