Secure UAV-assisted Mobile Edge Computing for IoT with Backscatter Communication in the Presence of a Moving Eavesdropper
DOI:
https://doi.org/10.4108/eetinis.v12i3.8889Keywords:
physical layer security, Internet of Things, mobile edge computing, unmanned aerial vehicle, RF energy harvesting, secrecy successful computation probabilityAbstract
The perception layer security (PLS) is crucial for ensuring that the data collected by Internet of Things (IoT) devices is accurate, reliable, and protected against various security threats. It helps maintain the overall integrity of the IoT ecosystem and builds trust in its applications. Our work explores the integration of network and PLS in a UAV-enabled mobile edge computing (MEC) system for IoT. This system supports multiple users with a combined non-orthogonal and time-division multiple access (NOTDMA) scheme and is based on backscatter communication (BC). In this system, the UAV-mounted server functions as a hybrid access point (HAP) and hovers over a cluster of energy-constrained IoT devices to transmit RF energy and assist them in performing tasks by employing BC. The IoT devices apply the combined NOTDMA scheme to offload their tasks to the HAP. A mobile passive eavesdropper attempts to intercept information from IoT devices without actively launching any attacks. A partial offloading scheme with various encryption algorithms is proposed to improve the system’s secrecy, which adapts to the users’ non-linear harvested energy levels. In addition, considering the network and physical security, we derive a approximation expression for the secrecy successful computation probability (SSCP). This expression incorporates factors such as harvested energy, local computing and encryption latency, edge offloading latency, processing, decryption, and the associated secrecy costs. The optimization problem for maximizing SSCP is formulated and solved using an Immune algorithm to find the optimal set of device parameters and UAV altitude. Key parameters affecting secrecy and latency performance are analyzed to better understand the system’s behavior. Numerical simulations are provided to validate the accuracy of our analysis.
Downloads
References
[1] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125–1142, 2017.
[2] P. Porambage, J. Okwuibe, M. Liyanage, M. Ylianttila, and T. Taleb, “Survey on multi-access edge computing for internet of things realization,” IEEE Communications Surveys and Tutorials, vol. 20, no. 4, pp. 2961–2991, 2018.
[3] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey on mobile edge computing: The communication perspective,” IEEE Communications Survey Tutorials, vol. 19, no. 4, pp. 2322–2358, 2017.
[4] M. Abrar, U. Ajmal, Z. M. Almohaimeed, X. Gui, R. Akram, and R. Masroor, “Energy efficient UAVenabled mobile edge computing for IoT devices: A review,” IEEE Access, vol. 9, pp. 127 779–127 798, 2021.
[5] A.-N. Nguyen, D.-B. Ha, V.-T. Truong, D.-T. Do, and C. So-In, “Secrecy performance analysis and optimization for UAV-relay-enabled WPT and cooperative NOMA MEC in IoT networks,” IEEE Access, vol. 11, pp. 127 800–127 816, 2022.
[6] Q. Liu, S. Sun, X. Yuan, and Y. Zhang, “Ambient backscatter communication-based smart 5G IoT network,” EURASIP Journal on Wireless Communications and Networking, vol. 2021, no. 1, pp. 1–19, 2021.
[7] S. H. H. Raza, D. Zorbas, and B. O’Flynn, “A comprehensive survey on RF energy harvesting: Applications and performance determinants,” Sensors, vol. 22, no. 8, p. 2990, 2022.
[8] J. Du, W. Liu, G. Lu, J. Jiang, D. Zhai, F. R. Yu, and Z. Ding, “When mobile-edge computing (MEC) meets nonorthogonal multiple access (NOMA) for the internet of things (IoT): System design and optimization,” IEEE Internet of Things Journal, vol. 8, no. 10, pp. 7849–7862, 2021.
[9] V. T. Truong, D. B. Ha, T. T. Vu, and H. A. Nguyen, “STAR-RIS aided mobile edge computing networks with uplink NOMA scheme,” in 2023 International Conference on Advanced Technologies for Communications (ATC), Da Nang, Vietnam, 2023.
[10] F. Jameel, S. Zeb, W. U. Khan, S. A. Hassan, Z. Chang, and J. Liu, “NOMA-enabled backscatter communications: Toward battery-free IoT networks,” IEEE Internet of Things Magazine, vol. 3, no. 4, pp. 95–101, 2020.
[11] E. T. Michailidis, K. Maliatsos, D. N. Skoutas, D. Vouyioukas, and C. Skianis, “Secure UAV-aided mobile edge computing for IoT: A review,” IEEE Access, vol. 10, pp. 86 353–86 383, 2022.
[12] K. Aarika, M. Bouhlal, R. A. Abdelouahid, S. Elfilali, and E. Benlahmar, “Perception layer security in the internet of things,” Procedia Computer Science, vol. 175, pp. 591–596, 2020, the 17th International Conference on Mobile Systems and Pervasive Computing (MobiSPC), The 15th International Conference on Future Networks and Communications (FNC), The 10th International Conference on Sustainable Energy Information Technology. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1877050920317853
[13] M. Bloch, O. Gunlu, A. Yener, F. Oggier, H. V. Poor, L. Sankar, and R. F. Schaefer, “An overview of information-theoretic security and privacy: Metrics, limits and applications,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 5–22, 2021.
[14] H. Wang, J. Jiang, G. Huang, W. Wang, D. Deng, B. M. Elhalawany, and X. Li, “Physical layer security of two-way ambient backscatter communication systems,” Wireless Communications and Mobile Computing, vol. 2022, no. 1, p. 5445676, 2022. [Online]. Available: https://onlinelibrary.wiley.com/doi/abs/10.1155/2022/5445676
[15] X. Li, Q.Wang, M. Zeng, Y. Liu, S. Dang, T. A. Tsiftsis, and O. A. Dobre, “Physical-layer authentication for ambient backscatter-aided NOMA symbiotic systems,” IEEE Transactions on Communications, vol. 71, no. 4, pp. 2288–2303, 2023.
[16] S. Han, J. Wang, L. Xiao, and C. Li, “Broadcast secrecy rate maximization in UAV-empowered IRS backscatter communications,” IEEE Transactions on Wireless Communications, vol. 22, no. 10, pp. 6445–6458, 2023.
[17] T. Van Truong, D.-B. Ha, and M.-T. Vo, Industrial Networks and Intelligent Systems. Springer Nature Switzerland, 2023, ch. A Secrecy Offloading in Radio Frequency Energy Harvesting NOMA Heterogeneous Mobile Edge Computing Network, pp. 275–286.
[18] G. Su, M. Dai, B. Chen, and X. Lin, “Deep reinforcement learning aided secure UAV communications in the presence of moving eavesdroppers,” Journal of King Saud University - Computer and Information Sciences, vol. 36, no. 4, p. 102047, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1319157824001368
[19] T. Zhou, Y. Fu, D. Qin, X. Nie, N. Jiang, and C. Li, “Secure and multistep computation offloading and resource allocation in ultradense multitask NOMAenabled IoT networks,” IEEE Internet of Things Journal, vol. 11, no. 3, pp. 5347–5361, 2024.
[20] G. K. Pandey, D. S. Gurjar, S. Yadav, and S. Solanki, “UAV-empowered IoT network with hardware impairments and shadowing,” IEEE Sensors Letters, vol. 7, no. 7, pp. 1–4, 2023.
[21] V.-T. Truong and D.-B. Ha, “A novel secrecy offloading in noma heterogeneous mobile edge computing network,” in International Conference on Advanced Engineering Theory and Applications. Springer, 2022, pp. 733–743.
[22] M. Rana, Q. Mamun, and R. Islam, “Lightweight cryptography in iot networks: A survey,” Future Generation Computer Systems, vol. 129, pp. 77–89, 2022.
[23] S. Singh, P. K. Sharma, S. Y. Moon, and J. H. Park, “Advanced lightweight encryption algorithms for iot devices: survey, challenges and solutions,” Journal of Ambient Intelligence and Humanized Computing, pp. 1–18, 2024.
24] D. D. Tran, H. V. Tran, D. B. Ha, and G. Kaddoum,“Secure transmit antenna selection protocol for MIMO NOMA networks over Nakagami-m channels,” IEEE Systems Journal, vol. 14, no. 1, pp. 253–264, 2020.
[25] E. Boshkovska, D. W. K. Ng, N. Zlatanov, and R. Schober, “Practical non-linear energy harvesting model and resource allocation for SWIPT systems,”IEEE Communications Letters, vol. 19, no. 12, pp. 2082–2085, 2015.
[26] S. Gong, Y. Xie, J. Xu, D. Niyato, and Y. C. Liang,“Deep reinforcement learning for backscatter-aided data offloading in mobile edge computing,” IEEE Network, vol. 34, no. 5, pp. 106–113, 10 2020.
[27] G. Su, M. Dai, B. Chen, and X. Lin, “Deep reinforcement learning aided secure uav communications in the presence of moving eavesdroppers,” Journal of King Saud University-Computer and Information Sciences, vol. 36, no. 4, p. 102047, 2024.
[28] M. Abdolshah, “A review of resource-constrained project scheduling problems (RCPSP) approaches and solutions,” International Transaction Journal of Engineering, Management, Applied Sciences and Technologies, vol. 5, no. 4, pp. 253–286, 2014.
[29] Y. Li, D. V. Huynh, V.-L. Nguyen, D.-B. Ha, H.- J. Zepernick, and T. Q. Duong, “Multiagent UAVaided URLLC mobile edge computing systems: A joint communication and computation optimization approach,” IEEE Systems Journal, pp. 1–11, 2024.
[30] Y. Lu, K. Xiong, P. Fan, Z. Ding, Z. Zhong, and K. B. Letaief, “Global energy efficiency in secure MISO SWIPT systems with non-linear power-splitting EH model,” IEEE Journal on Selected Areas in Communications, vol. 37, no. 1, pp. 216–232, 2019.
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2025 Van-Long Nguyen, Duy-Hung Ha, Van-Truong Truong, Tran Thanh Truc, Dac-Binh Ha

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 3.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.
 
			
		 
			 
			 
				