Secure UAV-assisted Mobile Edge Computing for IoT with Backscatter Communication in the Presence of a Moving Eavesdropper

Authors

DOI:

https://doi.org/10.4108/eetinis.v12i3.8889

Keywords:

physical layer security, Internet of Things, mobile edge computing, unmanned aerial vehicle, RF energy harvesting, secrecy successful computation probability

Abstract

The perception layer security (PLS) is crucial for ensuring that the data collected by Internet of Things (IoT) devices is accurate, reliable, and protected against various security threats. It helps maintain the overall integrity of the IoT ecosystem and builds trust in its applications. Our work explores the integration of network and PLS in a UAV-enabled mobile edge computing (MEC) system for IoT. This system supports multiple users with a combined non-orthogonal and time-division multiple access (NOTDMA) scheme and is based on backscatter communication (BC). In this system, the UAV-mounted server functions as a hybrid access point (HAP) and hovers over a cluster of energy-constrained IoT devices to transmit RF energy and assist them in performing tasks by employing BC. The IoT devices apply the combined NOTDMA scheme to offload their tasks to the HAP. A mobile passive eavesdropper attempts to intercept information from IoT devices without actively launching any attacks. A partial offloading scheme with various encryption algorithms is proposed to improve the system’s secrecy, which adapts to the users’ non-linear harvested energy levels. In addition, considering the network and physical security, we derive a approximation expression for the secrecy successful computation probability (SSCP). This expression incorporates factors such as harvested energy, local computing and encryption latency, edge offloading latency, processing, decryption, and the associated secrecy costs. The optimization problem for maximizing SSCP is formulated and solved using an Immune algorithm to find the optimal set of device parameters and UAV altitude. Key parameters affecting secrecy and latency performance are analyzed to better understand the system’s behavior. Numerical simulations are provided to validate the accuracy of our analysis.

Downloads

Download data is not yet available.

Author Biographies

Van-Long Nguyen, Duy Tan University

Van-Long Nguyen received a Bachelor’s degree in Information Technology from Pham Van Dong University, Quang Ngai, Vietnam, in 2012. He obtained a Master’s degree in Computer Science from Duy Tan University, Da Nang, Vietnam, in 2016. In 2024, he was recognized as a Ph.D. student at Duy Tan University, Da Nang, Vietnam. His main research interests include physical-layer security in wireless networks. He can be contacted via email at nguyenvanlong17@dtu.edu.vn.

Duy-Hung Ha, Ton Duc Thang University

Duy-Hung Ha received B.S. and M.S. degrees in Electronics and Telecommunications Engineering from Institute of Post and Telecommunication, Viet Nam; University of Transport and Communications, Ha Noi, Vietnam in 2007 and 2014. In 2017, he joined the Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Vietnam as a lecturer. In 2021, he received a Ph.D. in communication technology at VSB Technical University of Ostrava, Czech Republic. His major interests are cooperative communications, physical-layer security. He can be contacted at email: haduyhung@tdtu.edu.vn

Van-Truong Truong, Duy Tan University

Van-Truong Truong received a B.S. in Electronics and Telecommunication Engineering, an M.Sc. in Electronic Engineering from the University of Da Nang, and a Ph.D in Computer Science from Duy Tan University, Vietnam. He is Head of the Faculty of Electrical and Electronics Engineering at Duy Tan University, Da Nang, Vietnam. His research interests include nonorthogonal multiple access, wireless sensor networks, mobile edge computing, and the IoT. He has published several papers in ISI index journals, such as IEEE/CAA Journal of Automatica Sinica, Alexandria Engineering Journal, Computer Networks, Mobile Networks and Applications, IEEE Access, Computers Materials & Continua, and PeerJ Computer Science

Tran Thanh Truc, FPT University

Tran Thanh Truc received the PhD certificate of Electrical and Information Communications Systems in Ulsan University, South Korea in 2014. In 2017, he was head of Post and Telecommunication Office which is a part of Information and Communications Department of Danang city. He also participated as a leader
of a national level science project which was successfully conducted in 2019. From 2019 to March 2023, he held the position as director of the Danang city center of Information Infrastructure Development. His responsibilities were aimed at managing, exploiting and calling for investment to the Danang Software Park and operating the main IT infrastructures of Danang city government such as Data Center and MAN network. He starts as a lecturer, researcher in Computing Faculty in GreenWich Vietnam, FPT University in April 2023. His main researches are the studies of information theory, wireless communication technologies, networking, programming and digital signal processing. He can be contacted via email at tructt16@fe.edu.vn.

Dac-Binh Ha, Duy Tan University

Dac-Binh Ha received the B.S. degree in Radio Technique, the M.Sc. and Ph.D. degree in Communication and Information System from Huazhong University of Science and Technology (HUST), China in 1997, 2006, and 2009, respectively. He is currently the Dean of School of Engineering and Technology, Duy Tan University, Da Nang, Vietnam. His research interests are secrecy physical layer communications, cognitive radio, RF energy harvesting networks, mobile edge computing, quantum computing, quantum communications. He has published several papers on ISI/SCI/SCIE index journals, such as IEICE Transactions, Journal of Communications and Network, Wireless Communications and Mobile Computing, IETE Journal of Research, Elektronika ir Elektrotechnika, Wireless Personal Communications, IET Communications, Mobile Networks and Applications, IEEE Access, IEEE System and IEEE/CAA Journal of Automatica Sinica. 

References

[1] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125–1142, 2017.

[2] P. Porambage, J. Okwuibe, M. Liyanage, M. Ylianttila, and T. Taleb, “Survey on multi-access edge computing for internet of things realization,” IEEE Communications Surveys and Tutorials, vol. 20, no. 4, pp. 2961–2991, 2018.

[3] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey on mobile edge computing: The communication perspective,” IEEE Communications Survey Tutorials, vol. 19, no. 4, pp. 2322–2358, 2017.

[4] M. Abrar, U. Ajmal, Z. M. Almohaimeed, X. Gui, R. Akram, and R. Masroor, “Energy efficient UAVenabled mobile edge computing for IoT devices: A review,” IEEE Access, vol. 9, pp. 127 779–127 798, 2021.

[5] A.-N. Nguyen, D.-B. Ha, V.-T. Truong, D.-T. Do, and C. So-In, “Secrecy performance analysis and optimization for UAV-relay-enabled WPT and cooperative NOMA MEC in IoT networks,” IEEE Access, vol. 11, pp. 127 800–127 816, 2022.

[6] Q. Liu, S. Sun, X. Yuan, and Y. Zhang, “Ambient backscatter communication-based smart 5G IoT network,” EURASIP Journal on Wireless Communications and Networking, vol. 2021, no. 1, pp. 1–19, 2021.

[7] S. H. H. Raza, D. Zorbas, and B. O’Flynn, “A comprehensive survey on RF energy harvesting: Applications and performance determinants,” Sensors, vol. 22, no. 8, p. 2990, 2022.

[8] J. Du, W. Liu, G. Lu, J. Jiang, D. Zhai, F. R. Yu, and Z. Ding, “When mobile-edge computing (MEC) meets nonorthogonal multiple access (NOMA) for the internet of things (IoT): System design and optimization,” IEEE Internet of Things Journal, vol. 8, no. 10, pp. 7849–7862, 2021.

[9] V. T. Truong, D. B. Ha, T. T. Vu, and H. A. Nguyen, “STAR-RIS aided mobile edge computing networks with uplink NOMA scheme,” in 2023 International Conference on Advanced Technologies for Communications (ATC), Da Nang, Vietnam, 2023.

[10] F. Jameel, S. Zeb, W. U. Khan, S. A. Hassan, Z. Chang, and J. Liu, “NOMA-enabled backscatter communications: Toward battery-free IoT networks,” IEEE Internet of Things Magazine, vol. 3, no. 4, pp. 95–101, 2020.

[11] E. T. Michailidis, K. Maliatsos, D. N. Skoutas, D. Vouyioukas, and C. Skianis, “Secure UAV-aided mobile edge computing for IoT: A review,” IEEE Access, vol. 10, pp. 86 353–86 383, 2022.

[12] K. Aarika, M. Bouhlal, R. A. Abdelouahid, S. Elfilali, and E. Benlahmar, “Perception layer security in the internet of things,” Procedia Computer Science, vol. 175, pp. 591–596, 2020, the 17th International Conference on Mobile Systems and Pervasive Computing (MobiSPC), The 15th International Conference on Future Networks and Communications (FNC), The 10th International Conference on Sustainable Energy Information Technology. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1877050920317853

[13] M. Bloch, O. Gunlu, A. Yener, F. Oggier, H. V. Poor, L. Sankar, and R. F. Schaefer, “An overview of information-theoretic security and privacy: Metrics, limits and applications,” IEEE Journal on Selected Areas in Information Theory, vol. 2, no. 1, pp. 5–22, 2021.

[14] H. Wang, J. Jiang, G. Huang, W. Wang, D. Deng, B. M. Elhalawany, and X. Li, “Physical layer security of two-way ambient backscatter communication systems,” Wireless Communications and Mobile Computing, vol. 2022, no. 1, p. 5445676, 2022. [Online]. Available: https://onlinelibrary.wiley.com/doi/abs/10.1155/2022/5445676

[15] X. Li, Q.Wang, M. Zeng, Y. Liu, S. Dang, T. A. Tsiftsis, and O. A. Dobre, “Physical-layer authentication for ambient backscatter-aided NOMA symbiotic systems,” IEEE Transactions on Communications, vol. 71, no. 4, pp. 2288–2303, 2023.

[16] S. Han, J. Wang, L. Xiao, and C. Li, “Broadcast secrecy rate maximization in UAV-empowered IRS backscatter communications,” IEEE Transactions on Wireless Communications, vol. 22, no. 10, pp. 6445–6458, 2023.

[17] T. Van Truong, D.-B. Ha, and M.-T. Vo, Industrial Networks and Intelligent Systems. Springer Nature Switzerland, 2023, ch. A Secrecy Offloading in Radio Frequency Energy Harvesting NOMA Heterogeneous Mobile Edge Computing Network, pp. 275–286.

[18] G. Su, M. Dai, B. Chen, and X. Lin, “Deep reinforcement learning aided secure UAV communications in the presence of moving eavesdroppers,” Journal of King Saud University - Computer and Information Sciences, vol. 36, no. 4, p. 102047, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1319157824001368

[19] T. Zhou, Y. Fu, D. Qin, X. Nie, N. Jiang, and C. Li, “Secure and multistep computation offloading and resource allocation in ultradense multitask NOMAenabled IoT networks,” IEEE Internet of Things Journal, vol. 11, no. 3, pp. 5347–5361, 2024.

[20] G. K. Pandey, D. S. Gurjar, S. Yadav, and S. Solanki, “UAV-empowered IoT network with hardware impairments and shadowing,” IEEE Sensors Letters, vol. 7, no. 7, pp. 1–4, 2023.

[21] V.-T. Truong and D.-B. Ha, “A novel secrecy offloading in noma heterogeneous mobile edge computing network,” in International Conference on Advanced Engineering Theory and Applications. Springer, 2022, pp. 733–743.

[22] M. Rana, Q. Mamun, and R. Islam, “Lightweight cryptography in iot networks: A survey,” Future Generation Computer Systems, vol. 129, pp. 77–89, 2022.

[23] S. Singh, P. K. Sharma, S. Y. Moon, and J. H. Park, “Advanced lightweight encryption algorithms for iot devices: survey, challenges and solutions,” Journal of Ambient Intelligence and Humanized Computing, pp. 1–18, 2024.

24] D. D. Tran, H. V. Tran, D. B. Ha, and G. Kaddoum,“Secure transmit antenna selection protocol for MIMO NOMA networks over Nakagami-m channels,” IEEE Systems Journal, vol. 14, no. 1, pp. 253–264, 2020.

[25] E. Boshkovska, D. W. K. Ng, N. Zlatanov, and R. Schober, “Practical non-linear energy harvesting model and resource allocation for SWIPT systems,”IEEE Communications Letters, vol. 19, no. 12, pp. 2082–2085, 2015.

[26] S. Gong, Y. Xie, J. Xu, D. Niyato, and Y. C. Liang,“Deep reinforcement learning for backscatter-aided data offloading in mobile edge computing,” IEEE Network, vol. 34, no. 5, pp. 106–113, 10 2020.

[27] G. Su, M. Dai, B. Chen, and X. Lin, “Deep reinforcement learning aided secure uav communications in the presence of moving eavesdroppers,” Journal of King Saud University-Computer and Information Sciences, vol. 36, no. 4, p. 102047, 2024.

[28] M. Abdolshah, “A review of resource-constrained project scheduling problems (RCPSP) approaches and solutions,” International Transaction Journal of Engineering, Management, Applied Sciences and Technologies, vol. 5, no. 4, pp. 253–286, 2014.

[29] Y. Li, D. V. Huynh, V.-L. Nguyen, D.-B. Ha, H.- J. Zepernick, and T. Q. Duong, “Multiagent UAVaided URLLC mobile edge computing systems: A joint communication and computation optimization approach,” IEEE Systems Journal, pp. 1–11, 2024.

[30] Y. Lu, K. Xiong, P. Fan, Z. Ding, Z. Zhong, and K. B. Letaief, “Global energy efficiency in secure MISO SWIPT systems with non-linear power-splitting EH model,” IEEE Journal on Selected Areas in Communications, vol. 37, no. 1, pp. 216–232, 2019.

Downloads

Published

23-10-2025

How to Cite

Nguyen, V. L., Ha, D.-H., Truong, V. T., Tran, T. T., & Ha , D. B. (2025). Secure UAV-assisted Mobile Edge Computing for IoT with Backscatter Communication in the Presence of a Moving Eavesdropper. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 12(4). https://doi.org/10.4108/eetinis.v12i3.8889