JOURNAL ARTICLE

Secure Offloading in NOMA-Enabled Multi-Access Edge Computing Networks

Tong-Xing ZhengXin ChenYating WenNing ZhangDerrick Wing Kwan NgNaofal Al‐Dhahir

Year: 2023 Journal:   IEEE Transactions on Communications Vol: 72 (4)Pages: 2152-2165   Publisher: IEEE Communications Society

Abstract

Multi-access edge computing (MEC) has been recognized as a promising technology for enhancing the computation capability for next generation wireless networks. This paper studies physical layer security for an MEC network, where multiple users desire to securely offload part of their computation tasks to a base station (BS) simultaneously using non-orthogonal multiple access (NOMA) subject to the potential overhearing of a malicious eavesdropper. The secrecy outage probability (SOP) is adopted as a secrecy performance metric of the computation offloading against eavesdropping attacks. We aim to minimize the total energy consumption of the MEC system subject to an individual SOP constraint for each user. To this end, we jointly design each user's local computing bits, the transmit power, the secrecy code rates, as well as the successive interference cancellation decoding order at the BS side. As the formulated problem is highly non-convex and challenging to solve, we propose an efficient algorithm based on penalty dual decomposition (PDD) and sequential convex approximation methods to obtain an efficient suboptimal solution. To reduce the computational complexity, we further propose a reverse recursion (RR) algorithm and derive semi-closed-form solutions to the design problem. Numerical results are presented to validate the convergence and the effectiveness of our proposed algorithms. We show that the minimal total energy consumption obtained via either the PDD or RR method approaches the optimal performance of exhaustive search as the task duration increases. It is also demonstrated that the RR algorithm can achieve a comparable performance to that of the PDD algorithm while enjoying a much lower computational complexity.

Keywords:
Computer science Eavesdropping Mobile edge computing Transmitter power output Base station Wireless Performance metric Computation offloading Wireless network Decoding methods Node (physics) Edge computing Enhanced Data Rates for GSM Evolution Computer network Algorithm Channel (broadcasting) Server Transmitter

Metrics

11
Cited By
1.82
FWCI (Field Weighted Citation Impact)
45
Refs
0.84
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Wireless Communication Technologies
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Wireless Communication Security Techniques
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Stochastic Gradient Optimization Techniques
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.