2022
DOI: 10.1109/tcomm.2022.3159703
|View full text |Cite
|
Sign up to set email alerts
|

Secure NOMA-Based UAV-MEC Network Towards a Flying Eavesdropper

Abstract: Non-orthogonal multiple access (NOMA) allows multiple users to share link resource for higher spectrum efficiency. It can be applied to unmanned aerial vehicle (UAV) and mobile edge computing (MEC) networks to provide convenient offloading computing service for ground users (GUs) with largescale access. However, due to the line-of-sight (LoS) of UAV transmission, the information can be easily eavesdropped in NOMA-based UAV-MEC networks. In this paper, we propose a secure communication scheme for the NOMA-based… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 99 publications
(40 citation statements)
references
References 39 publications
0
26
0
Order By: Relevance
“…The authors show that the NOMA scheme outperforms its TDMA counterpart in terms of security capacity. A similar model is proposed by Lu et al [24]; a NOMAbased dual-UAV-MEC system with a flying service-provision UAV, a flying eavesdropping UAV, devices to be served, and a terrestrial jamming device. The authors formulate an optimization problem maximizing the average system security computation capacity by jointly optimizing SIC ordering variables, transmit powers, locally computed bits, UAV-MEC CPU frequency, and the service-providing UAV trajectory.…”
Section: Related Work and Novelty Of The Proposed Workmentioning
confidence: 99%
“…The authors show that the NOMA scheme outperforms its TDMA counterpart in terms of security capacity. A similar model is proposed by Lu et al [24]; a NOMAbased dual-UAV-MEC system with a flying service-provision UAV, a flying eavesdropping UAV, devices to be served, and a terrestrial jamming device. The authors formulate an optimization problem maximizing the average system security computation capacity by jointly optimizing SIC ordering variables, transmit powers, locally computed bits, UAV-MEC CPU frequency, and the service-providing UAV trajectory.…”
Section: Related Work and Novelty Of The Proposed Workmentioning
confidence: 99%
“…The main particularity in [78] is that NOMA was applied in a setup, where one UAV acted as a MEC node serving GSs, while a second UAV was a flying eavesdropper. Simultaneously, a ground jammer transmitted artificial noise to this eavesdropper.…”
Section: Noma Schemesmentioning
confidence: 99%
“…In particular, the authors in [199] focused on securing the offloaded information against the eavesdropper in an EH and FD relaying protocol employed by UAV-assisted MEC. The expressions of the offloading time, data size, and transmit power were obtained, and additionally, they analyzed the full, partial, and non-offloading conditions.…”
Section: Secured Uav Communications Using Fog Computingmentioning
confidence: 99%