EconPapers    
Economics at your fingertips  
 

Secure Computation Offloading Analysis for WPT-enabled UAV-assisted MEC Incorporating NOMA with Friendly Jammer in IoT Networks

Gia-Huy Nguyen (), Anh-Nhat Nguyen (), Khai Nguyen (), Minh-Sang Nguyen (), Tung-Son Ngo (), Ngoc-Anh Bui (), Phuong-Chi Le (), Manh-Duc Hoang (), Tien-Dat Trinh () and Tuan-Anh Hoang ()
Additional contact information
Gia-Huy Nguyen: FPT University
Anh-Nhat Nguyen: FPT University
Khai Nguyen: FPT University
Minh-Sang Nguyen: FPT University
Tung-Son Ngo: FPT University
Ngoc-Anh Bui: FPT University
Phuong-Chi Le: FPT University
Manh-Duc Hoang: FPT University
Tien-Dat Trinh: FPT University
Tuan-Anh Hoang: FPT University

Telecommunication Systems: Modelling, Analysis, Design and Management, 2025, vol. 88, issue 3, No 18, 18 pages

Abstract: Abstract This article investigates the efficacy of the secure computation offloading within an Internet of Things (IoT) network that employs wireless power transfer (WPT) -enabled unmanned aerial vehicle (UAV)-assisted mobile-edge computing (MEC) incorporating non-orthogonal multiple access (NOMA) over Nakagami-m fading channels. The proposed system is designed with the capability of offering proximate computational resources and substantial wireless power to clusters of resource-constrained edge devices (EDs). To proactively ensure secure communications, a friendly jammer (FJ) is strategically deployed to mitigate the adverse security threats posed by a multi-antenna passive eavesdropper. Accordingly, the assessment of the system’s secure computation offloading performance is facilitated through the derivation of a closed-form formulation termed secrecy successful computation probability (SSCP). This formulation explicitly considers the implications of imperfect channel state information (iCSI) and imperfect successive interference cancellation (iSIC), thereby ensuring realistic model applications. By aiming at maximizing SSCP and prioritizing an optimization algorithm that offers simplicity in implementation, computational efficiency, and minimal parameter-tuning requirements, an approach grounded on Ananya algorithm is formulated. Eventually, extensive numerical simulations have robustly validated the accuracy and viability of the system model, considering a wide range of critical parameters. Comparative findings demonstrate Ananya algorithm’s superiority on substantial aspects of rapid convergence towards optimal solutions and total computational duration compared to genetic algorithm (GA) and particle swarm intelligent (PSO).

Keywords: Unmanned aerial vehicles; Non-orthogonal multiple access; Wireless power transfer; Mobile edge computing; Physical layer security; Friendly jammer (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
http://link.springer.com/10.1007/s11235-025-01331-w Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:88:y:2025:i:3:d:10.1007_s11235-025-01331-w

Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235

DOI: 10.1007/s11235-025-01331-w

Access Statistics for this article

Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan

More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-07-10
Handle: RePEc:spr:telsys:v:88:y:2025:i:3:d:10.1007_s11235-025-01331-w