{"title":"Secured Scheme for RF Energy Harvesting Mobile Edge Computing Networks based on NOMA and Access Point Selection","authors":"Van-Truong Truong, Dac-Binh Ha","doi":"10.1109/NICS51282.2020.9335833","DOIUrl":null,"url":null,"abstract":"In this paper, we study an RF energy harvesting mobile edge computing network where an energy-constrained user harvests the RF energy from the power station and of-floading its tasks to two access points based on non-orthogonal multiple access (NOMA). In particular, the user can offload its confidential tasks to the trusted access point, and nonconfidential tasks can be offload to both trusted and untrusted access points by using the harvested energy. We propose two protocols based on NOMA, non-access point selection (NAPS), and access point selection (APS) schemes, namely NOMA-NAPS and NOMA-APS. The closed-form exact expressions of successful computation probability (SCP) are derived to evaluate these proposed protocols' system performance. Numerical results are shown that the NOMA-APS protocol outperforms the NOMA-NAPS one. The Monte-Carlo simulation results also verify the correctness of our analysis.","PeriodicalId":308944,"journal":{"name":"2020 7th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 7th NAFOSTED Conference on Information and Computer Science (NICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NICS51282.2020.9335833","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
In this paper, we study an RF energy harvesting mobile edge computing network where an energy-constrained user harvests the RF energy from the power station and of-floading its tasks to two access points based on non-orthogonal multiple access (NOMA). In particular, the user can offload its confidential tasks to the trusted access point, and nonconfidential tasks can be offload to both trusted and untrusted access points by using the harvested energy. We propose two protocols based on NOMA, non-access point selection (NAPS), and access point selection (APS) schemes, namely NOMA-NAPS and NOMA-APS. The closed-form exact expressions of successful computation probability (SCP) are derived to evaluate these proposed protocols' system performance. Numerical results are shown that the NOMA-APS protocol outperforms the NOMA-NAPS one. The Monte-Carlo simulation results also verify the correctness of our analysis.