Secure Offloading in NOMA-Enabled Multi-Access Edge Computing Networks

Multi-access edge computing (MEC) has been recognized as a promising technology for enhancing the computation capability for next generation wireless networks. This paper studies physical layer security for an MEC network, where multiple users desire to securely offload part of their computation tas...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on communications Vol. 72; no. 4; pp. 2152 - 2165
Main Authors Zheng, Tong-Xing, Chen, Xin, Wen, Yating, Zhang, Ning, Ng, Derrick Wing Kwan, Al-Dhahir, Naofal
Format Journal Article
LanguageEnglish
Published New York IEEE 01.04.2024
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN0090-6778
1558-0857
DOI10.1109/TCOMM.2023.3342242

Cover

Abstract Multi-access edge computing (MEC) has been recognized as a promising technology for enhancing the computation capability for next generation wireless networks. This paper studies physical layer security for an MEC network, where multiple users desire to securely offload part of their computation tasks to a base station (BS) simultaneously using non-orthogonal multiple access (NOMA) subject to the potential overhearing of a malicious eavesdropper. The secrecy outage probability (SOP) is adopted as a secrecy performance metric of the computation offloading against eavesdropping attacks. We aim to minimize the total energy consumption of the MEC system subject to an individual SOP constraint for each user. To this end, we jointly design each user's local computing bits, the transmit power, the secrecy code rates, as well as the successive interference cancellation decoding order at the BS side. As the formulated problem is highly non-convex and challenging to solve, we propose an efficient algorithm based on penalty dual decomposition (PDD) and sequential convex approximation methods to obtain an efficient suboptimal solution. To reduce the computational complexity, we further propose a reverse recursion (RR) algorithm and derive semi-closed-form solutions to the design problem. Numerical results are presented to validate the convergence and the effectiveness of our proposed algorithms. We show that the minimal total energy consumption obtained via either the PDD or RR method approaches the optimal performance of exhaustive search as the task duration increases. It is also demonstrated that the RR algorithm can achieve a comparable performance to that of the PDD algorithm while enjoying a much lower computational complexity.
AbstractList Multi-access edge computing (MEC) has been recognized as a promising technology for enhancing the computation capability for next generation wireless networks. This paper studies physical layer security for an MEC network, where multiple users desire to securely offload part of their computation tasks to a base station (BS) simultaneously using non-orthogonal multiple access (NOMA) subject to the potential overhearing of a malicious eavesdropper. The secrecy outage probability (SOP) is adopted as a secrecy performance metric of the computation offloading against eavesdropping attacks. We aim to minimize the total energy consumption of the MEC system subject to an individual SOP constraint for each user. To this end, we jointly design each user's local computing bits, the transmit power, the secrecy code rates, as well as the successive interference cancellation decoding order at the BS side. As the formulated problem is highly non-convex and challenging to solve, we propose an efficient algorithm based on penalty dual decomposition (PDD) and sequential convex approximation methods to obtain an efficient suboptimal solution. To reduce the computational complexity, we further propose a reverse recursion (RR) algorithm and derive semi-closed-form solutions to the design problem. Numerical results are presented to validate the convergence and the effectiveness of our proposed algorithms. We show that the minimal total energy consumption obtained via either the PDD or RR method approaches the optimal performance of exhaustive search as the task duration increases. It is also demonstrated that the RR algorithm can achieve a comparable performance to that of the PDD algorithm while enjoying a much lower computational complexity.
Author Chen, Xin
Ng, Derrick Wing Kwan
Wen, Yating
Zheng, Tong-Xing
Al-Dhahir, Naofal
Zhang, Ning
Author_xml – sequence: 1
  givenname: Tong-Xing
  orcidid: 0000-0002-8730-5063
  surname: Zheng
  fullname: Zheng, Tong-Xing
  email: zhengtx@mail.xjtu.edu.cn
  organization: Key Laboratory for Intelligent Networks and Network Security, Ministry of Education, and the School of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an, China
– sequence: 2
  givenname: Xin
  orcidid: 0000-0001-8164-3902
  surname: Chen
  fullname: Chen, Xin
  email: cx0513@stu.xjtu.edu.cn
  organization: Key Laboratory for Intelligent Networks and Network Security, Ministry of Education, and the School of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an, China
– sequence: 3
  givenname: Yating
  orcidid: 0000-0002-0497-3710
  surname: Wen
  fullname: Wen, Yating
  email: wyt461246@stu.xjtu.edu.cn
  organization: Key Laboratory for Intelligent Networks and Network Security, Ministry of Education, and the School of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an, China
– sequence: 4
  givenname: Ning
  orcidid: 0000-0001-9518-1622
  surname: Zhang
  fullname: Zhang, Ning
  email: ning.zhang@ieee.org
  organization: Electrical and Computer Engineering Department, University of Windsor, Windsor, ON, Canada
– sequence: 5
  givenname: Derrick Wing Kwan
  orcidid: 0000-0001-6400-712X
  surname: Ng
  fullname: Ng, Derrick Wing Kwan
  email: w.k.ng@unsw.edu.au
  organization: School of Electrical Engineering and Telecommunications, The University of New South Wales, Sydney, NSW, Australia
– sequence: 6
  givenname: Naofal
  orcidid: 0000-0001-9894-8382
  surname: Al-Dhahir
  fullname: Al-Dhahir, Naofal
  email: aldhahir@utdallas.edu
  organization: Department of Electrical and Computer Engineering, The University of Texas at Dallas, Richardson, TX, USA
BookMark eNp9kLFOwzAQQC1UJErhBxBDJOaUs53EyVhFLSC1zUCZLcc5Vy5pUuxEiL8npR0QA9Mt793p3jUZNW2DhNxRmFIK2eMmL1arKQPGp5xHjEXsgoxpHKchpLEYkTFABmEiRHpFrr3fAUAEnI_J4hV17zAojKlbVdlmG9gmWBerWThvVFljFaz6urPhTGv0PphXWwzydn_ouyO7xu6zde_-hlwaVXu8Pc8JeVvMN_lzuCyeXvLZMtQsS7owjTjHSEcZljozqUgzAapEAQwxUcpEcam5yoSgyFJaGpYIbXSVVDSmMQjOJ-ThtPfg2o8efSd3be-a4aTkw0cQJRzoQKUnSrvWe4dGatupzrZN55StJQV5rCZ_qsljNXmuNqjsj3pwdq_c1__S_UmyiPhL4AmnVPBvZSV5Tw
CODEN IECMBT
CitedBy_id crossref_primary_10_1186_s13638_024_02395_z
crossref_primary_10_1109_TWC_2024_3502435
crossref_primary_10_1016_j_comnet_2024_110802
Cites_doi 10.1109/JIOT.2018.2792423
10.1109/TWC.2017.2650987
10.1109/TIFS.2019.2912337
10.1109/TCOMM.2019.2949994
10.1109/LCOMM.2019.2950013
10.1017/CBO9780511804441
10.1109/ACCESS.2019.2925808
10.1109/ICCC52777.2021.9580336
10.1002/j.1538-7305.1975.tb02040.x
10.1007/978-3-030-55366-1
10.1109/LWC.2018.2845882
10.1007/978-981-10-1575-5
10.1109/TVT.2020.2996254
10.1109/ICASSP.2017.7952919
10.1109/JPROC.2016.2558521
10.1109/LSP.2018.2876019
10.1109/TCOMM.2019.2910263
10.1109/TIFS.2020.3040877
10.1109/JSTSP.2019.2893057
10.5120/16395-6014
10.1109/TSUSC.2021.3103476
10.1109/TCOMM.2018.2881725
10.1109/TVT.2019.2912227
10.1109/TCOMM.2017.2709301
10.1109/TVT.2019.2907253
10.1109/JIOT.2021.3125953
10.1109/TCOMM.2016.2599530
10.1109/LCN.2009.5355111
10.1109/MCOM.2015.7081071
10.1109/ICCT46805.2019.8947270
10.1109/JSAC.2018.2825560
10.1109/TCOMM.2020.2964541
10.1109/TWC.2017.2785305
10.1109/LCOMM.2011.011811.102433
10.1109/COMST.2017.2745201
10.1109/TVT.2017.2779508
10.1109/TSP.2014.2354312
10.1109/TCOMM.2018.2873359
10.1109/MSP.2014.2334709
10.1109/JIOT.2016.2584538
10.1109/GLOCOMW.2017.8269088
10.1109/JIOT.2018.2796542
10.1109/TIFS.2016.2516917
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024
DBID 97E
RIA
RIE
AAYXX
CITATION
7SP
8FD
L7M
DOI 10.1109/TCOMM.2023.3342242
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Electronics & Communications Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
DatabaseTitleList
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-0857
EndPage 2165
ExternalDocumentID 10_1109_TCOMM_2023_3342242
10363117
Genre orig-research
GrantInformation_xml – fundername: Natural Science Basic Research Plan of Shaanxi Province
  grantid: 2022JM-320
– fundername: Australia Research Council Discovery Project
  grantid: DP210102169; DP230100603
  funderid: 10.13039/501100000923
– fundername: National Natural Science Foundation of China
  grantid: 61701390; 62071370
  funderid: 10.13039/501100001809
– fundername: Fundamental Research Funds for the Central Universities
  grantid: xzy012021033
– fundername: China Postdoctoral Science Foundation
  grantid: 2021M702631
  funderid: 10.13039/501100002858
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
5GY
5VS
6IK
85S
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABFSI
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
ACKIV
ACNCT
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IES
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
RIA
RIE
RNS
TAE
TN5
VH1
ZCA
ZCG
AAYXX
CITATION
7SP
8FD
L7M
ID FETCH-LOGICAL-c296t-8433e4c49ebc9f878970abe702ee6aaf45bc3a9771e281bf267cfcd6d15150733
IEDL.DBID RIE
ISSN 0090-6778
IngestDate Mon Jun 30 10:13:06 EDT 2025
Thu Apr 24 22:55:42 EDT 2025
Wed Oct 01 03:32:36 EDT 2025
Wed Aug 27 02:17:04 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c296t-8433e4c49ebc9f878970abe702ee6aaf45bc3a9771e281bf267cfcd6d15150733
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-0497-3710
0000-0001-6400-712X
0000-0001-9518-1622
0000-0001-9894-8382
0000-0001-8164-3902
0000-0002-8730-5063
PQID 3040046301
PQPubID 85472
PageCount 14
ParticipantIDs proquest_journals_3040046301
crossref_citationtrail_10_1109_TCOMM_2023_3342242
crossref_primary_10_1109_TCOMM_2023_3342242
ieee_primary_10363117
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-04-01
PublicationDateYYYYMMDD 2024-04-01
PublicationDate_xml – month: 04
  year: 2024
  text: 2024-04-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on communications
PublicationTitleAbbrev TCOMM
PublicationYear 2024
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref35
ref12
ref34
ref15
ref37
ref14
ref36
ref31
ref30
ref11
ref33
ref10
ref32
ref2
ref1
ref17
ref39
ref16
ref38
ref19
ref18
ref24
ref23
ref26
ref25
ref20
ref42
ref41
ref22
ref21
ref43
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
References_xml – ident: ref2
  doi: 10.1109/JIOT.2018.2792423
– ident: ref30
  doi: 10.1109/TWC.2017.2650987
– ident: ref16
  doi: 10.1109/TIFS.2019.2912337
– ident: ref24
  doi: 10.1109/TCOMM.2019.2949994
– ident: ref28
  doi: 10.1109/LCOMM.2019.2950013
– ident: ref42
  doi: 10.1017/CBO9780511804441
– ident: ref26
  doi: 10.1109/ACCESS.2019.2925808
– ident: ref1
  doi: 10.1109/ICCC52777.2021.9580336
– ident: ref6
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– ident: ref7
  doi: 10.1007/978-3-030-55366-1
– ident: ref12
  doi: 10.1109/LWC.2018.2845882
– ident: ref9
  doi: 10.1007/978-981-10-1575-5
– ident: ref14
  doi: 10.1109/TVT.2020.2996254
– ident: ref40
  doi: 10.1109/ICASSP.2017.7952919
– ident: ref10
  doi: 10.1109/JPROC.2016.2558521
– ident: ref19
  doi: 10.1109/LSP.2018.2876019
– ident: ref37
  doi: 10.1109/TCOMM.2019.2910263
– ident: ref38
  doi: 10.1109/TIFS.2020.3040877
– ident: ref20
  doi: 10.1109/JSTSP.2019.2893057
– ident: ref3
  doi: 10.5120/16395-6014
– ident: ref23
  doi: 10.1109/TSUSC.2021.3103476
– ident: ref34
  doi: 10.1109/TCOMM.2018.2881725
– ident: ref13
  doi: 10.1109/TVT.2019.2912227
– ident: ref15
  doi: 10.1109/TCOMM.2017.2709301
– ident: ref21
  doi: 10.1109/TVT.2019.2907253
– ident: ref27
  doi: 10.1109/JIOT.2021.3125953
– ident: ref36
  doi: 10.1109/TCOMM.2016.2599530
– ident: ref43
  doi: 10.1109/LCN.2009.5355111
– ident: ref11
  doi: 10.1109/MCOM.2015.7081071
– ident: ref25
  doi: 10.1109/ICCT46805.2019.8947270
– ident: ref8
  doi: 10.1109/JSAC.2018.2825560
– ident: ref22
  doi: 10.1109/TCOMM.2020.2964541
– ident: ref33
  doi: 10.1109/TWC.2017.2785305
– ident: ref39
  doi: 10.1109/LCOMM.2011.011811.102433
– ident: ref5
  doi: 10.1109/COMST.2017.2745201
– ident: ref31
  doi: 10.1109/TVT.2017.2779508
– ident: ref41
  doi: 10.1109/TSP.2014.2354312
– ident: ref32
  doi: 10.1109/TCOMM.2018.2873359
– ident: ref35
  doi: 10.1109/MSP.2014.2334709
– ident: ref4
  doi: 10.1109/JIOT.2016.2584538
– ident: ref17
  doi: 10.1109/GLOCOMW.2017.8269088
– ident: ref18
  doi: 10.1109/JIOT.2018.2796542
– ident: ref29
  doi: 10.1109/TIFS.2016.2516917
SSID ssj0004033
Score 2.4806168
Snippet Multi-access edge computing (MEC) has been recognized as a promising technology for enhancing the computation capability for next generation wireless networks....
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2152
SubjectTerms Algorithms
Communication system security
Complexity
Computation offloading
Decoding
Eavesdropping
Edge computing
Energy consumption
Minimization
Mobile computing
Multi-access edge computing (MEC)
NOMA
non-orthogonal multiple access (NOMA)
Nonorthogonal multiple access
physical layer security (PLS)
Resource management
Secrecy aspects
secrecy outage probability (SOP)
secure offloading
Task analysis
total energy consumption
Wireless networks
Title Secure Offloading in NOMA-Enabled Multi-Access Edge Computing Networks
URI https://ieeexplore.ieee.org/document/10363117
https://www.proquest.com/docview/3040046301
Volume 72
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1558-0857
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0004033
  issn: 0090-6778
  databaseCode: RIE
  dateStart: 19720101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwELVoJxj4LKJQUAY2lODEjp2MVdWqQkq6tFK3KLEvCFGliKYLvx7bcaCAQGwZbMu6O9-dnXv3ELr141CUNCJuwYC4NAZ15pQvdgvOS8ZkXEYG4Z2kbLqgD8twacHqBgsDAKb4DDz9af7ly7XY6qcydcIJI77PO6jDI9aAtT5BkJjYlpO6np1HLUIGx_fz0SxJPE0U7hFCVdAKvkQhQ6vywxebADM5Qmm7taau5Nnb1oUn3r51bfz33o_RoU01nWFjGydoD6pTdLDTgPAMTcxzOzizslytTTW981Q56SwZumMDqpKOQei6Q8Or6IzlIzgNEYQemzY15JseWkzG89HUtcwKrghiVrsRJQSoUKophFIHj2KO8wI4DgBYnpc0LATJVWroQ6Dy2jJgXJRCMqnTH03zeI661bqCC-RIASHlmEuKgeZRVNDQzwGLgCrjUJevPvJbSWfCth3X7BerzFw_cJwZ7WRaO5nVTh_dfcx5aZpu_Dm6p8W9M7KRdB8NWo1m9mBuMmKcFlNu7fKXaVdoX61uq3MGqFu_buFaJR51cWMM7h0Tz9Hd
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED1BGYCBzyIKBTKwoYQkduxkrKpWBZp0aaVuUeJcEKJKEW0Xfj22k0ABgdgy2LJ1d747O_fuAVw7gSdy6hMzZUhMGqA8c9IXmynnOWNZkPsa4R1GbDCh91NvWoHVNRYGEXXxGVrqU__Lz-ZipZ7K5AknjDgO34Qtj1LqlXCtTxikTaqmk6qinfs1RsYObsfdURhaiircIoTKsOV-iUOaWOWHN9Yhpr8PUb25srLk2VotU0u8fevb-O_dH8BelWwandI6DmEDiyPYXWtBeAx9_eCOxijPZ3NdT288FUY0CjtmT8OqMkNjdM2OZlY0etkjGiUVhBoblVXkiyZM-r1xd2BW3AqmcAO2NH1KCFIhlZMKqRDuB9xOUuS2i8iSJKdeKkgik0MHXZnZ5i7jIhcZy1QCpIgeT6BRzAs8BSMT6FFu84zaSBPfT6nnJGgLl0rzkNevFji1pGNRNR5X_BezWF9A7CDW2omVduJKOy24-ZjzUrbd-HN0U4l7bWQp6Ra0a43G1dFcxES7LSYd29kv065gezAOh_HwLno4hx25UlWr04bG8nWFFzINWaaX2vjeAT7M1So
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Offloading+in+NOMA-Enabled+Multi-Access+Edge+Computing+Networks&rft.jtitle=IEEE+transactions+on+communications&rft.au=Zheng%2C+Tong-Xing&rft.au=Chen%2C+Xin&rft.au=Wen%2C+Yating&rft.au=Zhang%2C+Ning&rft.date=2024-04-01&rft.issn=0090-6778&rft.eissn=1558-0857&rft.volume=72&rft.issue=4&rft.spage=2152&rft.epage=2165&rft_id=info:doi/10.1109%2FTCOMM.2023.3342242&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TCOMM_2023_3342242
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0090-6778&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0090-6778&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0090-6778&client=summon