Secure Computation Offloading Analysis for WPT-enabled UAV-assisted MEC Incorporating NOMA with Friendly Jammer in IoT Networks
Gia-Huy Nguyen (),
Anh-Nhat Nguyen (),
Khai Nguyen (),
Minh-Sang Nguyen (),
Tung-Son Ngo (),
Ngoc-Anh Bui (),
Phuong-Chi Le (),
Manh-Duc Hoang (),
Tien-Dat Trinh () and
Tuan-Anh Hoang ()
Additional contact information
Gia-Huy Nguyen: FPT University
Anh-Nhat Nguyen: FPT University
Khai Nguyen: FPT University
Minh-Sang Nguyen: FPT University
Tung-Son Ngo: FPT University
Ngoc-Anh Bui: FPT University
Phuong-Chi Le: FPT University
Manh-Duc Hoang: FPT University
Tien-Dat Trinh: FPT University
Tuan-Anh Hoang: FPT University
Telecommunication Systems: Modelling, Analysis, Design and Management, 2025, vol. 88, issue 3, No 18, 18 pages
Abstract:
Abstract This article investigates the efficacy of the secure computation offloading within an Internet of Things (IoT) network that employs wireless power transfer (WPT) -enabled unmanned aerial vehicle (UAV)-assisted mobile-edge computing (MEC) incorporating non-orthogonal multiple access (NOMA) over Nakagami-m fading channels. The proposed system is designed with the capability of offering proximate computational resources and substantial wireless power to clusters of resource-constrained edge devices (EDs). To proactively ensure secure communications, a friendly jammer (FJ) is strategically deployed to mitigate the adverse security threats posed by a multi-antenna passive eavesdropper. Accordingly, the assessment of the system’s secure computation offloading performance is facilitated through the derivation of a closed-form formulation termed secrecy successful computation probability (SSCP). This formulation explicitly considers the implications of imperfect channel state information (iCSI) and imperfect successive interference cancellation (iSIC), thereby ensuring realistic model applications. By aiming at maximizing SSCP and prioritizing an optimization algorithm that offers simplicity in implementation, computational efficiency, and minimal parameter-tuning requirements, an approach grounded on Ananya algorithm is formulated. Eventually, extensive numerical simulations have robustly validated the accuracy and viability of the system model, considering a wide range of critical parameters. Comparative findings demonstrate Ananya algorithm’s superiority on substantial aspects of rapid convergence towards optimal solutions and total computational duration compared to genetic algorithm (GA) and particle swarm intelligent (PSO).
Keywords: Unmanned aerial vehicles; Non-orthogonal multiple access; Wireless power transfer; Mobile edge computing; Physical layer security; Friendly jammer (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
http://link.springer.com/10.1007/s11235-025-01331-w Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:88:y:2025:i:3:d:10.1007_s11235-025-01331-w
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235
DOI: 10.1007/s11235-025-01331-w
Access Statistics for this article
Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan
More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().