Secrecy Offloading Analysis of NOMA-based UAV-aided MEC in IoT Networks with Imperfect CSI and SIC

Authors

DOI:

https://doi.org/10.4108/eetsis.4664

Keywords:

nonorthogonal multiple access, unmanned aerial vehicle, physical-layer security, Internet Of Things (IOT), mobile-edge computing

Abstract

Nonorthogonal multiple access (NOMA) increases spectrum efficacy by permitting multiple devices to share link resources. It can be used to provide convenient offloading computing services for edge devices (EDs) in unmanned aerial vehicle (UAV) and mobile-edge computing (MEC) networks. However, due to the Line-of-Sight (LoS) of UAV transmission, NOMA-based UAV-MEC systems are susceptible to information eavesdropping. In this paper, we investigate a secure offloading model for a NOMA-based UAV-aided MEC in Internet of Things (IoT) network concerning an aerial eavesdropper (EAV) that considers imperfect channel state information (ipCSI) and imperfect successive interference cancellation (ipSIC).We derive the expression of secrecy successful computation probability (SSCP) across the entire system to analyze EAV’s impact on the performance of the NOMA-based UAV-aided MEC in IoT networks. In addition, we present a formulation of an optimization problem that optimizes the SSCP through the optimization of the UAV’s altitude and location, as well as the offloading ratio. To address this issue, a genetic algorithm (GA)-based approach was implemented. The results of our study were corroborated by the Monte Carlo simulations, which assessed system performance by considering multiple system parameters including the UAV’s location, altitude, average transmit signal-to-noise ratio (SNR), and offloading ratio.

References

Farha, Y.A. and Ismail, M.H. (2022) Design and optimization of a UAV-enabled non-orthogonal multiple access edge computing IoT system. IEEE Access 10:117385–117398.

Nguyen, A.N., Nhan Vo, V., So-In, C., Ha, D.B., Sanguanpong, S. and Baig, Z.A. (2019) On secure wireless sensor networks with cooperative energy harvesting relaying. IEEE Access 7: 139212–139225.

Nguyen, A.N., Vo, V.N., So-In, C. and Ha, D.B. (2021) System performance analysis for an energy harvesting iot system using a DF/AF UAV-enabled relay with downlink NOMA under nakagami-m fading. Sensors 21(1).

Nguyen, A.N., Ha, D.B., Vo, V.N., Truong, V.T., Do, D.T. and So-In, C. (2022) Performance analysis and optimization for iot mobile edge computing networks with RF energy harvesting and UAV relaying. IEEE Access 10: 21526–21540.

Nguyen, A.N., Ha, D.B., Truong, T.V., Vo, V.N., Sanguanpong, S. and So-In, C. (2023) Secrecy performance analysis and optimization for UAV-relay-enabled WPT and cooperative NOMA MEC in IoT networks. IEEE Access 11: 127800–127816.

Nguyen, A.N. and Bui, N.A. (2023) Performance analysis of IoT mobile edge computing networks using a DF/AF UAV-enabled relay with downlink noma. In Proc. IEEE Symposium on Industrial Electronics and Applications (ISIEA): 1–6.

Lu, W., Si, P., Gao, Y., Han, H., Liu, Z., Wu, Y. and Gong, Y. (2021) Trajectory and resource optimization in ofdm-based UAV-powered iot network. IEEE Trans. Green Commun. Netw. 5(3): 1259–1270.

Liu, Z., Qi, J., Shen, Y., Ma, K. and Guan, X. (2023) Maximizing energy efficiency in UAV-assisted NOMA–MEC networks. IEEE Internet Things J. 10(24): 22208–22222.

Liu, Y., Xie, S. and Zhang, Y. (2020) Cooperative offloading and resource management for UAV-enabled mobile edge computing in power IoT system. IEEE Trans. Veh. Technol. 69(10): 12229–12239.

Hu, Q., Cai, Y., Yu, G., Qin, Z., Zhao, M. and Li, G.Y. (2019) Joint offloading and trajectory design for UAVenabled mobile edge computing systems. IEEE Internet Things J. 6(2): 1879–1892.

Zhang, J., Zhou, L., Zhou, F., Seet, B.C., Zhang, H., Cai, Z. and Wei, J. (2020) Computation-efficient offloading and trajectory scheduling for multi-UAV assisted mobile edge computing. IEEE Trans. Veh. Technol. 69(2): 2114–2125.

Na, Z., Liu, Y., Shi, J., Liu, C. and Gao, Z. (2021) Uavsupported clustered NOMA for 6G-enabled internet of things: Trajectory planning and resource allocation. IEEE Internet Things J. 8(20): 15041–15048.

Zhang, X., Zhang, J., Xiong, J., Zhou, L. and Wei, J. (2020) Energy-efficient multi-UAV-enabled multiaccess edge computing incorporating NOMA. IEEE Internet Things J. 7(6): 5613–5627.

Budhiraja, I., Kumar, N., Tyagi, S. and Tanwar, S. (2021) Energy consumption minimization scheme for NOMA-based mobile edge computation networks underlaying UAV. IEEE Syst. J. 15(4): 5724–5733.

Rupasinghe, N., Yapici, Y., Guvenc, I., Dai, H. and Bhuyan, A. (2018) Enhancing physical layer security for NOMA transmission in mmwave drone networks. In Proc. 52nd Asilomar Conf. Signals, Syst., Comput.: 729–733.

Cao, Y., Zhao, N., Chen, Y., Jin, M., Ding, Z., Li, Y. and Yu, F.R. (2020) Secure transmission via beamforming optimization for NOMA networks. IEEE Wireless Commun. 27(1): 193–199.

Sun, X., Yang, W. and Cai, Y. (2020) Secure communication in NOMA-assisted millimeter-wave SWIPT UAV [18] Xu, Y., Zhang, T., Yang, D., Liu, Y. and Tao, M. (2021) Joint resource and trajectory optimization for security in UAV-assisted MEC systems. IEEE Trans. Commun. 69(1): 573–588.

Al-Hourani, A., Kandeepan, S. and Lardner, S. (2014) Optimal lap altitude for maximum coverage. IEEE Wireless Commun. Lett. 3(6): 569–572.

Yang, Z., Ding, Z., Fan, P. and Karagiannidis, G.K. (2016) On the performance of non-orthogonal multiple access systems with partial channel information. IEEE Trans. Commun. 64(2): 654–667.

Nguyen, A.N., Ha, D.B., Truong, V.T., So-In, C., Aimtongkham, P., Sakunrasrisuay, C. and Punriboon, C. (2022) On secrecy analysis of UAV-enabled relaying NOMA systems with RF energy harvesting. In Proc. Industrial Networks and Intelligent Systems: 267–281.

Rauniyar, A., Osterbo, O.N., Hakegard, J.E. and Engelstad, P.E. (2022) Secrecy performance analysis of cooperative nonorthogonal multiple access in iot networks. IEEE Sensors J. 22(19): 19030–19045.

Zhang, T., Xu, Y., Loo, J., Yang, D. and Xiao, L. (2020) Joint computation and communication design for UAV-assisted mobile edge computing in iot. IEEE Trans. Ind. Informat. 16(8): 5505–5516.

Truong, V.T. and Ha, D.B. (2022) A novel secrecy offloading in NOMA heterogeneous mobile edge computing network. In Proc. Advanced Engineering – Theory and Applications: 468–477.

Judd, K.L. (2012) Quadrature methods. In Proc. Initiative Comput. Econ., Chicago: 1–29.

Wen, X., Ruan, Y., Li, Y., Xia, H., Zhang, R., Wang, C., Liu, W. et al. (2022) Improved genetic algorithm based 3-D deployment of UAVs. Journal of Communications and Networks 24(2): 223–231. 10

Downloads

Published

23-07-2024

How to Cite

1.
Nguyen A-N, Ngo T-S, Bui N-A, Le P-C, Hoang M-D. Secrecy Offloading Analysis of NOMA-based UAV-aided MEC in IoT Networks with Imperfect CSI and SIC. EAI Endorsed Scal Inf Syst [Internet]. 2024 Jul. 23 [cited 2024 Dec. 12];11. Available from: https://publications.eai.eu/index.php/sis/article/view/4664

Issue

Section

Research articles